{"title":"Towards a modal logic for /spl pi/-calculus","authors":"Taolue Chen, Tingting Han, Jian Lu","doi":"10.1109/CMPSAC.2004.1342854","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342854","url":null,"abstract":"The pi-calculus is one of the most important mobile process calculi and has been well studied in literature. Temporal logic is thought of as a good compromise between description convenience and abstraction and can support useful computational applications, such as model-checking. In this paper, we use a symbolic transition graph inherited from pi-calculus to model concurrent systems. A wide class of processes, that is, finite-control processes, can be represented as a finite symbolic transition graph. A new version of modal logic for the pi-calculus, an extension of the modal mu-calculus with Boolean expressions over names, and primitives for name input and output are introduced as an appropriate temporal logic for the pi-calculus. Since we make a distinction between proposition and predicate, the possible interactions between recursion and first-order quantification can be solved. A concise semantics interpretation for our modal logic is given. Based on this work, we provide a model checking algorithm for the logic. This algorithm follows Winskel's well known tag set method to deal with the fixpoint operator. As for the problem of name instantiating, our algorithm follows the 'on-the-fly' style, and systematically employs schematic names. The correctness of the algorithm is shown","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133944542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-based access control for ubiquitous service provisioning","authors":"Antonio Corradi, R. Montanari, Daniela Tibaldi","doi":"10.1109/CMPSAC.2004.1342877","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342877","url":null,"abstract":"Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. In particular, mobility of users/devices causes frequent and unpredictable changes in physical user location and in consequently available resources and services. Users can also change portable access devices, with different capabilities, even at runtime and during the same service session, thus forcing us to consider very dynamic aspects even due to client heterogeneity. Access control to resources is crucial to leverage the provision of ubiquitous services and calls for novel solutions based on various context information, e.g., user/device location, device properties, user needs, local resource visibility. This work presents a novel access control model built upon the concept of context as the first-class design principle to rule access to resources. As key features, this model allows to associate access control permissions with contexts where users operate and users acquire/lose their permissions when entering/leaving a specific context. Unlike traditional access control solutions where user identity/role triggers policy evaluation when requesting resource access, this model exploits the user context to fully determine the set of available permissions. In addition, the proposed model allows to express context-based access control policies at a high level of abstraction cleanly separate from service logic implementation, thus promoting dynamic policy modification with no impact on the service code. The paper shows the implementation of the proposed model in the UbiCOSM framework and presents a mobile office service provisioning scenario.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Component failure mitigation according to failure type","authors":"F. Ye, T. Kelly","doi":"10.1109/CMPSAC.2004.1342841","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342841","url":null,"abstract":"Off-The-Shelf (OTS) software components are being used within complex safety-critical applications. However, to use these untrustworthy components with confidence, it is necessary to ensure that potential failures of the components cannot contribute to system level hazards. This requires the system level effects of component failures to be understood and mitigated using suitable fault tolerance techniques. However, the black-box nature of an OTS component implies the visibility and modifiability of the component is very limited. This restricts the choice of available fault tolerance techniques in mitigating failures of an OTS component. This paper presents a systematic approach to facilitate the selection of appropriate mitigation strategies according to a classification of failure types of an untrustworthy component. This approach enables an untrustworthy component to be used in a safety-critical context with increased confidence","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123538399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wu Ji, Yang Hai-yan, Jia Xiao-xia, Liu Chang, Liu Chao, Jin Mao-Zhong
{"title":"Application of maximum entropy principle to software failure prediction","authors":"Wu Ji, Yang Hai-yan, Jia Xiao-xia, Liu Chang, Liu Chao, Jin Mao-Zhong","doi":"10.1109/CMPSAC.2004.1342825","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342825","url":null,"abstract":"Predicting failures from software input is still a tough issue. Two models, namely the surface model and structure model, are presented in this paper to predict failure by applying the maximum entropy principle. The surface model forecasts a failure from the statistical co-occurrence between input and failure, while the structure model does from the statistical cause-effect between fault and failure. To evaluate the models, precision is applied and 17 testing experiments are conducted on 5 programs. Based on the experiments, the surface model and structure model get an average precision of 0.876 and 0.858, respectively","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122074146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AdapTIVE: an intelligent virtual environment and its application in e-commerce","authors":"Cássia Trojahn dos Santos, F. Osório","doi":"10.1109/CMPSAC.2004.1342880","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342880","url":null,"abstract":"This work presents an intelligent virtual environment, called AdapTIVE (adaptive three-dimensional intelligent and virtual environment), which has its structure and presentation customized according to users' interests and preferences (represented in a user model) and in accordance with insertion and removal of contents in this environment. An automatic content categorization process is applied to create content models, used in the spatial organization of the contents in the environment. An intelligent agent assists users during navigation in the environment and retrieval of relevant information. This is a promising approach for new and advanced forms of education, entertainment and e-commerce. In order to validate our approach, a case study of an e-commerce environment is presented.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"22 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Laurini, L. Paolino, M. Sebillo, G. Tortora, G. Vitiello
{"title":"A spatial SQL extension for continuous field querying","authors":"R. Laurini, L. Paolino, M. Sebillo, G. Tortora, G. Vitiello","doi":"10.1109/CMPSAC.2004.1342681","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342681","url":null,"abstract":"In the last decade, a growing interest has been devoted to the management of data referring to geographic scenarios. However, the attention of recent research has been focused on discrete data disregarding continuous data, because of their intrinsic complexity. We introduce an extension of a spatial SQL, which provides users with the capability to pose queries about both discrete and continuous data.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Almeida, Alexandre Alvaro, D. Lucrédio, A. F. Prado, L. Trevelin
{"title":"Distributed component-based software development: an incremental approach","authors":"E. Almeida, Alexandre Alvaro, D. Lucrédio, A. F. Prado, L. Trevelin","doi":"10.1109/CMPSAC.2004.1342798","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342798","url":null,"abstract":"In spite of recent and constant researches in the component-based development (CBD) area, there is still a lack of patterns, approaches and methodologies that effectively support the development \"for reuse\" as much as \"with reuse\". Considering the accelerated growth of the Internet over the last decade, where distribution has become an essential non-functional requirement of most applications, the problem becomes bigger. This paper proposes an incremental approach that integrates the concepts of component-based software engineering (CBSE), frameworks, patterns, and distribution. An experimental study evaluates the viability of using the approach and the impact of applying it in development projects","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using FMEA for early robustness analysis of Web-based systems","authors":"Jianyun Zhou, T. Stålhane","doi":"10.1109/CMPSAC.2004.1342662","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342662","url":null,"abstract":"Time pressure and quality issues are two main challenges facing today's Web development professionals. To achieve quick development of high-quality systems, a lot of methods and techniques have been proposed. A widely recognized strategy in current practice is to emphasize early quality assurance techniques, as the late detection of defects are well known to be expensive and time-consuming. We take robustness as a critically important quality attribute, and propose a general framework for conducting early robustness analysis for Web-based systems, based on Jacobson's analysis method and FMEA (failure mode and effect analysis).","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123364722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating regression tests via model checking","authors":"Lihua Xu, M. Dias, D. Richardson","doi":"10.1109/CMPSAC.2004.1342855","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342855","url":null,"abstract":"During software maintenance, regression testing is an expensive but critical activity to ensure that modified versions of the system do not \"regress\". As software evolves, chances are that not only the implementation changes, but that the specification of the system changes too. We argue that guiding regression testing by the system specifications generated early in the software lifecycle will be more accurate than extracting specification from source code, and more cost effective. Model checking is used to reason about the truth of statements about the system specification. We use a model checker as part of a highly automated regression test generation tool, providing a practical approach to specification based regression testing. Features of our approach that support different specification description languages and different test coverage criteria are also presented.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun, Kunio Noguchi, Y. Kyoya
{"title":"Priority assessment of software requirements from multiple perspectives","authors":"Xiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun, Kunio Noguchi, Y. Kyoya","doi":"10.1109/CMPSAC.2004.1342872","DOIUrl":"https://doi.org/10.1109/CMPSAC.2004.1342872","url":null,"abstract":"The development of complex software systems involves collecting software requirements from various stakeholders. Often stakeholder perceptions conflict during the requirements elicitation phase. An effective technique to resolve such a conflict is needed. We presented a framework that prioritizes software requirements gathered from multiple stakeholders by incorporating inter-perspective relationships, which is not addressed by existing priority assessment techniques. We use a relationship matrix to analyze the impact between requirements and facilitate the integration process which assesses their priorities based on their relationships from multiple perspectives. It allows the development team to resolve conflicts effectively and concentrate their valuable time and resources on the critical few requirements from multiple perspectives that directly contribute to high customer satisfaction.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132109530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}