13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)最新文献

筛选
英文 中文
SET: interactive tool for learning and training scan-based DFT principles and their consequences to parameters of embedded system SET:用于学习和训练基于扫描的DFT原理及其对嵌入式系统参数的影响的交互式工具
Josef Strnadel, Z. Kotásek
{"title":"SET: interactive tool for learning and training scan-based DFT principles and their consequences to parameters of embedded system","authors":"Josef Strnadel, Z. Kotásek","doi":"10.1109/ECBS.2006.65","DOIUrl":"https://doi.org/10.1109/ECBS.2006.65","url":null,"abstract":"In the paper, upgraded version of our tool for learning and training of scan design for testability technique principles and its consequences to parameters of embedded system is presented. It is outlined how the tool can be utilized in education process in order to illustrate relation between design and diagnostic parameters of embedded system","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing 用于混合多跳路由的自动配置、自适应、度量驱动的簇头组织
Nikos Migas, W. Buchanan
{"title":"An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing","authors":"Nikos Migas, W. Buchanan","doi":"10.1109/ECBS.2006.23","DOIUrl":"https://doi.org/10.1109/ECBS.2006.23","url":null,"abstract":"Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provides an effective way to reduce network overhead, in contrast to traditional flooding methods. This novel method creates a network backbone for data routing and location management, which is composed of the fittest nodes. The key metrics are: mobility, buffering capabilities, throughput, network state, utilisation, and battery reserves. The paper presents the overall agent-based model, and describes the adaptability of the cluster-head metrics, and the automated reconfigurability of an ad-hoc network","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive tracking in distributed wireless sensor networks 分布式无线传感器网络中的自适应跟踪
Lizhi Yang, Chuan Feng, J. Rozenblit, Haiyan Qiao
{"title":"Adaptive tracking in distributed wireless sensor networks","authors":"Lizhi Yang, Chuan Feng, J. Rozenblit, Haiyan Qiao","doi":"10.1109/ECBS.2006.20","DOIUrl":"https://doi.org/10.1109/ECBS.2006.20","url":null,"abstract":"We study the problem of tracking moving objects using distributed wireless sensor networks (WSNs) in which sensors are deployed randomly. Due to the uncertainty and unpredictability of real-world objects' motion, the tracking algorithm is needed to adapt to real-time changes of velocities and directions of a moving target. Moreover, the energy consumption of the tracking algorithm has to be considered because of the inherent limitations of wireless sensors. In this paper, we proposed an energy efficient tracking algorithm, called Predict-and-Mesh (PaM) that is well suited for pervasively monitoring various kinds of objects with random movement patterns. PaM is a distributed algorithm consisting of two prediction models: n-step prediction and collaborative prediction, and a predication failure recovery process called mesh. The simulation results show that the PaM algorithm is robust against diverse motion changes and has the excellent performance","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Guided architecture-based design optimisation of CBSs 指导基于架构的CBSs设计优化
David Livolsi, T. O'Neill, J. Leaney, M. Denford, K. Dunsire
{"title":"Guided architecture-based design optimisation of CBSs","authors":"David Livolsi, T. O'Neill, J. Leaney, M. Denford, K. Dunsire","doi":"10.1109/ECBS.2006.44","DOIUrl":"https://doi.org/10.1109/ECBS.2006.44","url":null,"abstract":"Computer-based systems (CBS) are becoming increasingly pervasive throughout society, continually increasing in complexity and cost as they are called upon to fulfil more and more complicated tasks. Unfortunately, multi-million dollar projects often fail because the systems are unreliable, inefficient, insecure and unmaintainable. The National Australia Bank's $409M software writedown and the failure of the $250M Australian Customs Service Integrated Cargo System are but two recent Australian examples. Clearly, systems must be built with a range of qualities such as reliability, performance and security, in addition to their required functionality, if they are to be successful. In other fields of engineering, such as aerospace and aeronautical engineering, where similar challenges of multiple conflicting requirements are faced, the approach of design optimisation has been found to be successful. This experience indicates that a similar approach of design optimisation also help to meet the challenges presented by the quality requirements of CBSs. This paper advances our work on design optimisation with an exploratory optimisation method that derives an architecture that best satisfies the system's quality requirements. The method allows a designer to explore possible architectures by repeatedly applying evolutions to an initial architecture, with the quality attributes of each architecture being collected throughout and providing feedback that guides the designer to the final optimal architecture. A prototype tool is also presented that implements this architecture-based optimisation method, using Avolution's industry-proven ABACUStrade toolset","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130709540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UMLintr: a UML profile for specifying intrusions UMLintr:用于指定入侵的UML概要文件
Mohammed Hussein, Mohammad Zulkernine
{"title":"UMLintr: a UML profile for specifying intrusions","authors":"Mohammed Hussein, Mohammad Zulkernine","doi":"10.1109/ECBS.2006.70","DOIUrl":"https://doi.org/10.1109/ECBS.2006.70","url":null,"abstract":"Specifications of non-functional requirements (NFR) such as security, safety, usability are as important as specification of functional requirements (FR). Non conformance to some NFR may render the whole software useless. There are many difficulties associated with the representation of NFR and the complexity of their subsequent validation. The main objective of this work is towards incorporating an important aspect of NFR, i.e., security from the very beginning of a software development process. In this paper, a framework is presented for specifying intrusion scenarios in the Unified Modeling Language (UML). We describe a UML profile called UMLintr (UML for intrusion specifications) that allows developers to specify intrusions using UML notations extended to suit the context of intrusion scenarios. The framework utilizes the expressiveness of UML and eliminates the need of using attack languages that are proposed only to describe attack scenarios. Since developers do not need to learn a separate language to describe attacks, the task of specifying intrusion scenarios becomes much easier. This approach also helps to avoid conflicting (e.g., security vs. usability), ambiguous, and redundant requirements. Examples are provided to show the usage of the proposed UML profile","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128891996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
An enhanced model for agent based requirement gathering and pre-system analysis 基于agent的需求收集和预系统分析的增强模型
P. Ranjan, A. Misra
{"title":"An enhanced model for agent based requirement gathering and pre-system analysis","authors":"P. Ranjan, A. Misra","doi":"10.1109/ECBS.2006.24","DOIUrl":"https://doi.org/10.1109/ECBS.2006.24","url":null,"abstract":"Agent oriented software development is generally motivated by the need of open and adaptive systems development that continuously change and evolve to meet new requirements. In this paper, we propose an agent-based open and adaptive system development process. The proposed methodology is based on model-based techniques and provides a specific model for the type of information to be gathered and uses this model to drive the user-oriented requirement analysis, specification and system-oriented analysis process. The proposed methodology also reduces the complexity of the software system and provides better quality with better user-satisfaction. The Gaia and ROADMAP models have been used as a fundamental ingredient to the new proposed agent-based modeling method. In the proposed agent-based system, the focus is on a clear separation between the requirement gathering and analysis phases. The scope of the discussion covers requirements gathering and user-oriented analysis phases only and does not touch upon the system analysis and design phases","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modeling and analysis of functionality in eHome systems: dynamic rule-based conflict detection eHome系统中功能的建模和分析:基于规则的动态冲突检测
Ibrahim Armaç, M. Kirchhof, Liviana Manolescu
{"title":"Modeling and analysis of functionality in eHome systems: dynamic rule-based conflict detection","authors":"Ibrahim Armaç, M. Kirchhof, Liviana Manolescu","doi":"10.1109/ECBS.2006.48","DOIUrl":"https://doi.org/10.1109/ECBS.2006.48","url":null,"abstract":"The domain of eHome systems is a special application-area for pervasive computing. Many different kinds of devices are introduced to the home area to provide functionality for enhanced comfort or security. A similar level of heterogeneity can be found at the software level: many different vendors supply eHome systems with drivers and services, which intend to compute sensor information and trigger devices in the eHome. This multi-level heterogeneity leads to system faults in terms of deadlocks and unpredictable or disillusioning behavior. We call these error conditions conflicts. Pervasive systems, especially eHome systems, is only useful and thus successful, if such conflicts can be handled properly. In this paper, we analyze eHome systems with respect to types of conflicts and discuss how conflicts can be detected. We show that the dynamic conflict detection is reasonable and possible by a rule-based conflict detection. The detection is well-founded on a formal specification and is seamlessly integrated into the paradigm of component-based software construction","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"21 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132496713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Evaluating cognitive information complexity measure 评估认知信息复杂性测量
D. S. Kushwaha, A. Misra
{"title":"Evaluating cognitive information complexity measure","authors":"D. S. Kushwaha, A. Misra","doi":"10.1109/ECBS.2006.41","DOIUrl":"https://doi.org/10.1109/ECBS.2006.41","url":null,"abstract":"In this paper, an attempt has been made to evaluate cognitive information complexity measure (CICM) terms of nine Weyuker properties. It has been found that all the nine properties have been satisfied by CICM and hence establishes cognitive information complexity measure based on information contained in the software as a robust and well-structured one","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Requirements engineering for the adviser portal bank system 顾问门户银行系统的需求工程
Jens Bæk Jørgensen, Kristian Bisgaard Lassen
{"title":"Requirements engineering for the adviser portal bank system","authors":"Jens Bæk Jørgensen, Kristian Bisgaard Lassen","doi":"10.1109/ECBS.2006.60","DOIUrl":"https://doi.org/10.1109/ECBS.2006.60","url":null,"abstract":"The adviser portal (AP) is a new IT system for 15 Danish banks. The main goal of AP is to increase the efficiency and quality of bank advisers' work. Requirements engineering for AP includes describing new work processes that must be supported by AP using a combination of: (1) prose and informal drawings; (2) formal models; and (3) graphical animation. This representation helps users and systems analysts to align new work processes and AP via early experiments in a prototyping fashion. The contribution of this paper is to present and reflect upon the analysis and description of one specific, important work process","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114298680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid intrusion detection and visualization system 一种混合入侵检测和可视化系统
Jianfeng Peng, Chuan Feng, J. Rozenblit
{"title":"A hybrid intrusion detection and visualization system","authors":"Jianfeng Peng, Chuan Feng, J. Rozenblit","doi":"10.1109/ECBS.2006.8","DOIUrl":"https://doi.org/10.1109/ECBS.2006.8","url":null,"abstract":"Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125694616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信