{"title":"The avalanche paradigm: an experimental software programming technique for improving fault-tolerance","authors":"J. Voas, K. Miller","doi":"10.1109/ECBS.1996.494522","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494522","url":null,"abstract":"Fault propagation is both boon and curse. For programs undergoing V&V, propagation is a boon, since fault detection is the goal. After software deployment, particularly for safety critical applications, propagation can result in hazardous outputs, which are a curse. Methods to decrease fault propagation for deployed systems are warranted, and we have provided just such a technique in this paper. Fault-tolerant mechanisms are more or less effective depending on where they are placed in a program. This paper combines two different techniques in order to find places where fault-tolerant mechanisms are most likely to defend against hazards. The two techniques are: (1) dynamic fault-injection to estimate the likelihood that anomalies will lead to hazards, and (2) a static analysis that predicts (via a heuristic) the likelihood that program state anomalies (\"corruptions\") will propagate to subsequent program states during execution.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"444 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A codesign case study: implementing arithmetic functions in FPGAs","authors":"Ilya V. Klotchkov, S. Pedersen","doi":"10.1109/ECBS.1996.494565","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494565","url":null,"abstract":"Different ways of implementing and designing arithmetic functions for 16/32 bit integers in FPGA technology are studied. A comparison of four different design methods is also included. The results are used to increase the overall system performance in a dedicated 3D image analysis prototype system by moving a vector length calculation from software to hardware. The conclusion is that by adding one relatively simple board containing two FPGAs in the prototype setup, the total computing time is reduced by 30%. The total amount of image data, in this case 300 Mbyte, which has to be transmitted via the network is reduced by a factor of two, and the required network bandwidth is reduced similarly.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case studies in CBS development-manufacturing. An experience report","authors":"M. Voss, O. Hammerschmidt","doi":"10.1109/ECBS.1996.494511","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494511","url":null,"abstract":"Within this paper we investigate some of the issues of carrying out the ECBS development process according to systems theories and architectures. The case studies of a production cell automation and autonomous transport systems are used to illustrate this.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Safety Argument Manager: an integrated approach to the engineering and safety assessment of computer based systems","authors":"S. Wilson, J. Mcdermid, P. Kirkham, P. Fenelon","doi":"10.1109/ECBS.1996.494529","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494529","url":null,"abstract":"This paper presents details of the Safety Argument Manager (SAM) a PC based tool to support safety case construction. SAM is novel in that it stresses total system safety and is designed to support an integrated process for design and assessment. SAM provides facilities for the construction of high level safety arguments and for building up complete and consistent supporting evidence. We focus on the achievement of high quality supporting evidence, by describing SAM's facilities for integrated modelling and safety assessment. We also illustrate the use of SAM with a car braking system example.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127401948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of the Sparrow processor","authors":"Reinhard Bündgen, W. Küchlin, W. Lauterbach","doi":"10.1109/ECBS.1996.494515","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494515","url":null,"abstract":"We present a new gate-level hardware verification method based on term rewriting systems. As an application, we formally verify the Sparrow microprocessor with the term rewriting theorem prover ReDuX. Our designs are given as net-lists in BLIF format. We mechanically compile the net-lists into the formal axiomatization of Sparrow as a term rewriting system. ReDuX can then emulate Sparrow symbolically. We manually produce verification conditions from the user-level processor specification and verify each one of them. Our axiomatization corresponds directly to net-lists, and thus is intuitive and close to the hardware. Except for simple equations no higher concept of logic is involved.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domain engineering: the challenge, status, and trends","authors":"S. White, M. Edwards","doi":"10.1109/ECBS.1996.494516","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494516","url":null,"abstract":"Naval Surface Warfare Center Dahlgren Division, under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval Surface Warfare Center; has initiated a thrust to examine the ongoing trends in engineering complex systems, to enrich and enhance the state-of-the-art in engineering methods and practices, and to facilitate the implementation of desired improvements. To support that thrust, the Second Annual Workshop on Engineering of Systems in the 21st Century: Facing the Challenge, was held in June 1995. One hundred and seventy five technical and organizational leaders from industry, government agencies, and academia were invited. Each participated in one of thirteen Focus Groups. This paper summarizes the results of the Domain Engineering Focus Group.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new method for identification of reusable software components","authors":"B. Keepence, C. McCausland, M. Mannion","doi":"10.1109/ECBS.1996.494508","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494508","url":null,"abstract":"Modern engineering systems are increasingly software intensive. There is pressure from customers to reduce costs and development times whilst increasing quality. Finding appropriate techniques for achieving this are a major concern for systems engineers. Increased reuse addresses this concern. Domain Modelling is seen as a way of extracting the common features in a domain. The problems are: how to build a domain model; populate it and reuse from it. In this paper we show how to build an Object Oriented Domain Model using discriminants. Discriminants are modelled using patterns. The resulting architectural model can then be used to build new systems in the domain by selecting features. This paper presents the results of a case study where the method has been applied to the generation of a Domain Model for Spacecraft Mission Planning Systems. The method has been successful where classical attempts have failed.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical architectural design, simulation and evaluation","authors":"C. Schaffer","doi":"10.1109/ECBS.1996.494527","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494527","url":null,"abstract":"This paper presents a system theoretical approach which should ease systems architecting. This approach makes architectural design decisions explicit, and by using simulation the interrelations between different architectural design decisions can be determined. In that way an early feedback which reduces the risk of not meeting the requirements can be realized. Additionally, reuse and exchange of architectures is supported. A tool environment is presented which allows for the partial application of this approach.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"57 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123407035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WinDLX and MIPSim pipeline simulators for teaching computer architecture","authors":"H. Grünbacher, Maziar Khosravipour","doi":"10.1109/ECBS.1996.494568","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494568","url":null,"abstract":"The paper describes two pipeline simulators which have been developed to support the teaching of computer architecture. WinDLX is at the computer architecture level, MIPSim is at the computer organization level. Both simulators run under MS Windows.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Vogelsang, U. Brinkschulte, Marios Siormanolakis
{"title":"Archiving system states by persistent objects","authors":"H. Vogelsang, U. Brinkschulte, Marios Siormanolakis","doi":"10.1109/ECBS.1996.494541","DOIUrl":"https://doi.org/10.1109/ECBS.1996.494541","url":null,"abstract":"The paper describes one specific aspect of the software component construction in the life cycles of computer based systems. The construction is located following the requirements analysis, conception and design. Systems are designed as within the ECBS process so called services which consist of a set of objects working together, keeping the states of the system. To ensure an efficient and rapid construction of systems an easy to use mechanism to store and retrieve objects together with their relations is necessary. This demands an embedded method of keeping objects in a database-the persistence. The described mechanism is implemented using C++ and verified in some projects. A man machine service is used as an example to show the application of this approach.","PeriodicalId":244671,"journal":{"name":"Proceedings IEEE Symposium and Workshop on Engineering of Computer-Based Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122325584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}