11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)最新文献

筛选
英文 中文
Reliability - security model 可靠性-安全性模型
N. Schneidewind
{"title":"Reliability - security model","authors":"N. Schneidewind","doi":"10.1109/ICECCS.2006.71","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.71","url":null,"abstract":"This paper includes the conditional probability of security failures given the occurrence of reliability failures. To our knowledge, this is the first research to perform this type of integration of reliability and security. It was necessary for us to use hypothetical but realistic probability distributions and parameters because, unfortunately, cyber attack data is not publicly available. In our model, we calculate error rates between predicted and actual values of reliability and security quantities. We provide a discussion of the policy implications for mitigating reliability and security problems based on model results. Our approach is most applicable to critical infrastructure systems","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A layered behavioural model of platelets 血小板的分层行为模型
Steve A. Schneider, H. Treharne, Ana Cavalcanti, J. Woodcock
{"title":"A layered behavioural model of platelets","authors":"Steve A. Schneider, H. Treharne, Ana Cavalcanti, J. Woodcock","doi":"10.1109/ICECCS.2006.80","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.80","url":null,"abstract":"There is great interest in the application of nanotechnology to medicine, but concerns for safety are paramount. We present a modelling technique based on CSP and B as a starting point for simulation of networks of nano-robots. The model and the simulations are central features of our proposed approach to the construction of safety cases for nanomedicine applications, and complex networks of cooperating components in general. Our work is based on a case study: the clotting behaviour of (artificial) platelets. We present a model, and discuss its analysis and uses","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Automation of Java Card component development using the B method 使用B方法实现Java Card组件的自动化开发
D. Déharbe, B. Gomes, A. Moreira
{"title":"Automation of Java Card component development using the B method","authors":"D. Déharbe, B. Gomes, A. Moreira","doi":"10.1109/ICECCS.2006.51","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.51","url":null,"abstract":"This paper presents a method for the rigorous development of Java Card smart card applications, using the B method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specification of the application logic does not need to take into account the specific aspects of the Java Card platform (in particular, communication between the card acceptance device and the smart card itself). A sequence of pre-established refinements is then applied to the original specification to yield an implementation-level B description of the component, which can then be used to synthesize Java Card code. This method reduces significantly the required amount of user-interaction and improves productivity. An interesting side-effect of this approach is that the specification may be reused with any other platform of implementation","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the generation of object databases using booster 用boost生成对象数据库
J. Davies, James Welch, Alessandra Cavarra, E. Crichton
{"title":"On the generation of object databases using booster","authors":"J. Davies, James Welch, Alessandra Cavarra, E. Crichton","doi":"10.1109/ICECCS.2006.65","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.65","url":null,"abstract":"This paper shows how ideas from a combination of formal techniques can be used to enable the automatic generation of databases from precise object models. It explores how the specification of an object database design can be formalized in terms of method preconditions, method postconditions, and invariant properties - many of which will correspond to integrity constraints for the data representation. Individual method specifications can be completed to reflect constraints expressed elsewhere in the model, composed to specify transactions, and then translated into executable code, to produce a reliable data store with a programming interface. The process of completion, composition, and translation may be automated to produce a model-driven approach to the development of object databases","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Biologically-inspired concepts for self-management of complexity 生物学启发的自我管理复杂性的概念
Roy Sterritt, M. Hinchey
{"title":"Biologically-inspired concepts for self-management of complexity","authors":"Roy Sterritt, M. Hinchey","doi":"10.1109/ICECCS.2006.52","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.52","url":null,"abstract":"Inherent complexity in large-scale applications may be impossible to eliminate or even ameliorate despite a number of promising advances. In such cases, the complexity must be tolerated and managed. Such management may be beyond the abilities of humans, or require such overhead as to make management by humans unrealistic. A number of initiatives inspired by concepts in biology have arisen for self-management of complex systems. We present some ideas and techniques we have been experimenting with, inspired by lesser-known concepts in biology that show promise in protecting complex systems and represent a step towards self-management of complexity","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126601494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Verification of control systems using Circus 使用Circus验证控制系统
Ana Cavalcanti, P. Clayton
{"title":"Verification of control systems using Circus","authors":"Ana Cavalcanti, P. Clayton","doi":"10.1109/ICECCS.2006.72","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.72","url":null,"abstract":"The design of control systems is usually based on diagrammatic definitions of control laws. The independent use of Z and CSP to verify their implementations has been successful, even for very large applications; high levels of automation have been achieved with tools based on a theorem prover called ProofPower. We have extended this approach to integrate the use of Z and CSP using a notation called Circus; as a result, we can handle a larger set of diagrams and prove more properties of the implementation. In this paper, we show how we can reuse the existing tools and experience to provide automation in the context of the new technique. This gives us confidence in its applicability in industry","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128090598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A tool-supported review approach to detecting structural consistency violations 一种工具支持的检查方法,用于检测结构一致性违规
Yuting Chen, Shaoying Liu, Fumiko Nagoya
{"title":"A tool-supported review approach to detecting structural consistency violations","authors":"Yuting Chen, Shaoying Liu, Fumiko Nagoya","doi":"10.1109/ICECCS.2006.46","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.46","url":null,"abstract":"The application of specification-based program verification techniques (e.g., testing, review, and proof) faces strong challenges in practice when the gap between the structure of a specification and that of its program is large. In this paper, we describe a tool-supported review approach to detecting structural consistency violations by introducing the review method, discussing the design and implementation of the tool, and presenting a case study to assess the effectiveness of the tool and identify points for further improvement","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the complexity of design in imaging software 浅谈成像软件设计的复杂性
Magnus E. Larsson, P. Laplante
{"title":"On the complexity of design in imaging software","authors":"Magnus E. Larsson, P. Laplante","doi":"10.1109/ICECCS.2006.64","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.64","url":null,"abstract":"Recent evidence raised the possibility that algorithm rich software, such as in imaging processing, is more complex than other kinds (Sangwan, 2005). To further investigate this contention a set of complexity metrics were computed for two sets of open source Java software systems. The results suggest that there is little or no difference in software complexity between an imaging application, and \"conventional\" software, such as a simple database querying system. The tests suggest that the overall complexity of the system depends more on the software design knowledge of the engineers than the kind of system that is constructed","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116023004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A real-time high-fidelity driving simulator system based on PC clusters 基于PC机集群的实时高保真驾驶仿真系统
Duoduo Liao
{"title":"A real-time high-fidelity driving simulator system based on PC clusters","authors":"Duoduo Liao","doi":"10.1109/ICECCS.2006.45","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.45","url":null,"abstract":"There are many challenges to create a real-time high-fidelity driving simulator based on PC clusters with multi-channeled projector support, while still maintaining at least 30 frame rates for complex scenes. This paper describes how such a system was conceived and implemented to support behavioral research on highway safety and operations. The real highway safety research study is used to compare the driver behavior derived from real-world roadway data with data collected in a simulated environment to valid the simulator. The hardware and software architectures are discussed in detail, respectively. Such architectures have been constructed to support upgradeability, scalability, extendibility, and flexibility. The experimental results of the real study are shown in daytime and nighttime, respectively. The conclusions and future work are described in the end","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient dynamic multikeys in Enterprise JavaBeans Enterprise JavaBeans中高效的动态多键
R. Klemm
{"title":"Efficient dynamic multikeys in Enterprise JavaBeans","authors":"R. Klemm","doi":"10.1109/ICECCS.2006.54","DOIUrl":"https://doi.org/10.1109/ICECCS.2006.54","url":null,"abstract":"The J2EE platform allows the rapid development of a large class of complex and robust server-side applications. However, some J2EE constraints pose serious challenges to the development of J2EE applications that interact with legacy systems outside the originally targeted J2EE domain. One such constraint is the static nature of identities of entity Enterprise JavaBeans (EJBs). We present a case study that motivates the introduction of dynamic sets of identities of entity EJBs, which we call dynamic multikeys, and describe five different ways of implementing dynamic multikeys based on static EJB identities. We compare the characteristics of our dynamic multikey solutions and demonstrate through performance tests that one of them is superior from a performance point of view. However, each one of the slower solutions offers distinct advantages that may make it attractive to some developers and for applications where the performance of dynamic multikeys is not a critical factor","PeriodicalId":269321,"journal":{"name":"11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信