D. Dechev, P. Pirkelbauer, N. Rouquette, B. Stroustrup
{"title":"Semantically Enhanced Containers for Concurrent Real-Time Systems","authors":"D. Dechev, P. Pirkelbauer, N. Rouquette, B. Stroustrup","doi":"10.1109/ECBS.2009.12","DOIUrl":"https://doi.org/10.1109/ECBS.2009.12","url":null,"abstract":"Future space missions, such as Mars Science Laboratory, are built upon computing platforms providing a high degree of autonomy and diverse functionality. The increased sophistication of robotic spacecraft has skyrocketed the complexity and cost of its software development and validation. The engineering of autonomous spacecraft software relies on the availability and application of advanced methods and tools that deliver safe concurrent synchronization as well as enable the validation of domain-specific semantic invariants. The software design and certification methodologies applied at NASA do not reach the level of detail of providing guidelines for the development of reliable concurrent software. To achieve effective and safe concurrent interactions as well as guarantee critical domain-specific properties in code, we introduce the notion of a Semantically Enhanced Container (SEC). A SEC is a data structure engineered to deliver the flexibility and usability of the popular ISO C++ Standard Template Library containers, while at the same time it is hand-crafted to guarantee domain-specific policies. We demonstrate the SEC proof-of-concept by presenting a shared nonblocking SEC vector. To eliminate the hazards of the ABA problem (a fundamental problem in lock-free programming), we introduce an innovative library for querying C++ semantic information. Our SEC design aims at providing an effective model for shared data access within the JPL's Mission Data System. Our test results show that the SEC vector delivers significant performance gains (a factor of 3 or more) in contrast to the application of nonblocking synchronization amended with the traditional ABA avoidance scheme.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automatic Approach to Generating State Diagram from Contract-Based Class","authors":"J. Bae, H. Chae","doi":"10.1109/ECBS.2009.36","DOIUrl":"https://doi.org/10.1109/ECBS.2009.36","url":null,"abstract":"State diagrams are commonly used to describe thedynamic behavior of an individual object. In otherwords, state diagrams can represent sequences ofoperations in classes. In addition, state diagrams arecommonly used for various purposes: test casegeneration, formal verification and code generation.Because state diagrams describe all the possibledynamic behaviors of an object, it is very difficult todraw and understand them. This paper presents anautomated approach to the generation of a statediagram from a contract-based class. That is, a statediagrams are automatically generated by analyzingpre/post conditions of each operation. We alsodeveloped a tool for supporting our approach andapplied the tool to two case studies, MicrowaveOvenand BlankReader. We have found that the proposedtechnique and tool can be useful for constructing statediagrams from contract-based classes.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Definition of \"Abstraction Level\" for Metamodels","authors":"Monperrus Martin, A. Beugnard, J. Champeau","doi":"10.1109/ECBS.2009.41","DOIUrl":"https://doi.org/10.1109/ECBS.2009.41","url":null,"abstract":"In model-driven software development, the first-class data are models, which are all structured by a metamodel. In this paper, we propose a definition of abstraction levels for metamodels based on set theory and compatible with MOF. We claim that splitting metamodels into different abstractions levels raise their organizational quality. We present application cases of this statement.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Framework for Agile Management Based on Chaos and Complex System Theories","authors":"B. M. Khoshroo, H. Rashidi","doi":"10.1109/ECBS.2009.31","DOIUrl":"https://doi.org/10.1109/ECBS.2009.31","url":null,"abstract":"The necessity of a paradigm shift in software project management, particularly with advent of agile methods, nowadays is an interesting and challenging issue. The values and principles that have centrality in agile thought need new approaches in relation to project management. The main causes of this needed paradigm shift are unpredictability and dynamicity of software processes, and inefficiency of traditional approaches. With respect to these factors, and increasing growth of applying chaos and complex system theories in organizational study and strategic management, this research attempts to design a framework for managing agile projects based on these two theories. Concepts of these theories will be a lens to investigate software project management and propose new practices. Our analyses indicate that chaos theory can further shape strategic decisions in comparison to complex system concepts that can further help designing an appropriate agile team in the level of people interaction.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Tun, R. Chapman, Charles B. Haley, R. Laney, B. Nuseibeh
{"title":"A Framework for Developing Feature-Rich Software Systems","authors":"T. Tun, R. Chapman, Charles B. Haley, R. Laney, B. Nuseibeh","doi":"10.1109/ECBS.2009.32","DOIUrl":"https://doi.org/10.1109/ECBS.2009.32","url":null,"abstract":"In response to changing requirements and other environmental influences, software systems are increasingly developed incrementally. Successful implementation of new features in existing software is often difficult, whilst many software systems simply 'break' when features are introduced. Size and complexity of modern software, poor software design, and lack of appropriate tools are some of the factors that often confound the issue. In this paper, we report on a successful industrial experience of evolving a feature-rich program analysis tool for dependable software systems. The experience highlights the need for a development framework to maintain rich traceability between development artifacts, and to satisfy certain conditions of artifacts during and after the implementation of a new feature.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Dougherty, Jules White, C. Thompson, D. Schmidt
{"title":"Automating Hardware and Software Evolution Analysis","authors":"B. Dougherty, Jules White, C. Thompson, D. Schmidt","doi":"10.1109/ECBS.2009.22","DOIUrl":"https://doi.org/10.1109/ECBS.2009.22","url":null,"abstract":"Cost-effective software evolution is critical to many distributed real-time and embedded (DRE) systems. Selecting the lowest cost set of software components that meet DRE system resource constraints, such as total memory and available CPU cycles, is an NP-Hard problem. This paper provides three contributions to R&D on evolving software-intensive DRE systems. First, we present the Software Evolution Analysis with Resources (SEAR) technique that transforms component-based DRE system evolution alternatives into multidimensional multiple-choice knapsack problems. Second, we compare several techniques for solving these knapsack problems to determine valid, low-cost design configurations for resource constrained component-based DRE systems.if false with multiple potential upgrades that cannot be solved efficiently by existing techniquesfi. Third, we empirically evaluate the techniques to determine their applicability in the context of common evolution scenarios. Based on these findings, we present a taxonomy of the solving techniques and the evolution scenarios that best suit each technique.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Modeling Approach for Web-Service-Based Business Processes","authors":"Meiko Jensen, Sven Feja","doi":"10.1109/ECBS.2009.14","DOIUrl":"https://doi.org/10.1109/ECBS.2009.14","url":null,"abstract":"The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide a transformation that automatically derives WS-Security Policy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"794 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125365779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analysis of Probabilistic Timed Systems","authors":"A. Dubey, D. Riley, S. Abdelwahed, T. Bapty","doi":"10.1109/ECBS.2009.44","DOIUrl":"https://doi.org/10.1109/ECBS.2009.44","url":null,"abstract":"Probabilistic models are useful for analyzing systems which operate under the presence of uncertainty. In this paper, we present a technique for verifying safety and liveness properties for probabilistic timed automata. The proposed technique is an extension of a technique used to verify stochastic hybrid automata using an approximation with Markov Decision Processes. A case study for CSMA/CD protocol has been used to show case the methodology used in our technique.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Vajk, Róbert Kereskényi, T. Levendovszky, Á. Lédeczi
{"title":"Raising the Abstraction of Domain-Specific Model Translator Development","authors":"T. Vajk, Róbert Kereskényi, T. Levendovszky, Á. Lédeczi","doi":"10.1109/ECBS.2009.30","DOIUrl":"https://doi.org/10.1109/ECBS.2009.30","url":null,"abstract":"Model-based development methodologies are gaining ground as software applications are getting more and more complex while the pressure to decrease time-to-market continually increase. Domain-specific modeling tools that support system analysis, simulation, and automatic code generation can increase productivity. However, most domain-specific model translators are still manually written. This paper presents a technique that automatically generates a domain-specific application programming interface from the same metamodels that are used to define the domain-specific modeling language itself. This facilitates the creation of domain-specific model translators by providing a high-level abstraction hiding all the cumbersome modeling tool-specific implementation details from the developer. The approach is illustrated using the Generic Modeling Environment and the Microsoft .NET C# language.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stephan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch
{"title":"Software Architectural Design Meets Security Engineering","authors":"Stephan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch","doi":"10.1109/ECBS.2009.17","DOIUrl":"https://doi.org/10.1109/ECBS.2009.17","url":null,"abstract":"Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well as software engineering provide methods to deal with such requirements. However, there is still a critical gap concerning the integration of the methods of these separate fields. In this paper we close this gap with respect to security requirements by proposing a method that combines software engineering approaches with state-of-the-art security engineering principles. This method establishes an explicit alignment between the non-functional goal, the principles in the field of security engineering, and the implementation of a security architecture. The method aims at designing a system's security architecture based on a small, precisely defined, and application-specific trusted computing base. We illustrate this method by means of a case study which describes distributed enterprise resource planning systems using web services to implement business processes across company boundaries.","PeriodicalId":263562,"journal":{"name":"2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}