The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Service-oriented design (SOD) is a software development paradigm that utilizes services as fundamental elements for developing applications/solutions. Recently, service orientation is becoming a mainstream approach for building large scale software systems. However, current software models do not take services as fundamental elements and it is very difficult for people to model from services. We consider...
Misuse case modeling is a viable option to depict the security requirements together with functional requirements. To investigate the interplay between functional and security requirements, this paper presents an approach to decomposing use cases, misuse cases, and mitigation use cases. We identify relationships among decomposed cases for each case type (use, misuse, mitigation use) and ensure consistency...
This paper considers how the algebraic semantics for Verilog relates with its denotational semantics. Our approach is to derive the denotational semantics from the algebraic semantics. We first present the algebraic laws for Verilog. Every program can be expressed as a guarded choice that can model the execution of a program. In order to investigate the parallel expansion laws, a sequence is introduced,...
Enterprise information system configuration is a complex process dealing with interrelated issues. A four-stage methodology has been proposed in order to effectively explore configuration issues. The main advantage of the proposed methodology is the adoption of a common meta-model for the representation of systems throughout all configuration stages, ensuring interoperability and model consistency...
This paper formalizes the notion of a design model structurally conforming to a design pattern by representing the model as a logic program whilst the pattern as a query. The conformance of a model to a design pattern is equivalent to the satisfaction of the query by the logic program. Harnessing logic inference capability of logic programming languages, we obtain an automated method that infers all...
This paper shows how ideas from a combination of formal techniques can be used to enable the automatic generation of databases from precise object models. It explores how the specification of an object database design can be formalized in terms of method preconditions, method postconditions, and invariant properties - many of which will correspond to integrity constraints for the data representation...
Our approach to the model-driven collaborative design of workflows for bioinformatic applications uses the jABC for model driven mediation and choreography to complement a Web service-based elementary service provision. jABC is a framework for service development based on lightweight process coordination. Users (product developers and system/software designers) develop services and applications by...
The grid represents an emerging class of highly complex distributed systems that aims to realize the full potential of the Web services computational and architectural models. Blueprints and recipes for building grids do not as of yet exist. We present a grid architectural style, and describe how it has been designed, and its relationships with other key elements of distributed systems
A formal correctness proof of a self-stabilizing lscr-exclusion algorithm (SLEX) is described. The analyzed algorithm is an improvement of the SLEX due to Abraham, Dolev, Herman, and Koll, since our version satisfies a stronger liveness property. The proof is formulated in linear-time temporal logic and utilizes a history variable to model access to regular registers. The proof consists of a safety...
The application of specification-based program verification techniques (e.g., testing, review, and proof) faces strong challenges in practice when the gap between the structure of a specification and that of its program is large. In this paper, we describe a tool-supported review approach to detecting structural consistency violations by introducing the review method, discussing the design and implementation...
There is great interest in the application of nanotechnology to medicine, but concerns for safety are paramount. We present a modelling technique based on CSP and B as a starting point for simulation of networks of nano-robots. The model and the simulations are central features of our proposed approach to the construction of safety cases for nanomedicine applications, and complex networks of cooperating...
We explore various definitions and characteristics of emergence, how we might recognise and measure emergence, and how we might engineer emergent systems. We discuss the TUNA (Theory Underpinning Nanotech Assemblers) project, which is investigating emergent engineering in the context of molecular nanotechnology, and use the TUNA case study to explore an architecture suitable for emergent complex systems
This paper presents a method for the rigorous development of Java Card smart card applications, using the B method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specification of the application logic does not need to take into account the specific aspects of the Java Card platform...
This paper includes the conditional probability of security failures given the occurrence of reliability failures. To our knowledge, this is the first research to perform this type of integration of reliability and security. It was necessary for us to use hypothetical but realistic probability distributions and parameters because, unfortunately, cyber attack data is not publicly available. In our...
The following topics are dealt with: software experiences; requirements engineering; objects and communication; hardware and software; autonomous and autonomic systems; system verification; and distributed system.
There are many challenges to create a real-time high-fidelity driving simulator based on PC clusters with multi-channeled projector support, while still maintaining at least 30 frame rates for complex scenes. This paper describes how such a system was conceived and implemented to support behavioral research on highway safety and operations. The real highway safety research study is used to compare...
With current trends towards more complex software system and use of higher level languages, a monitoring technique is of increasing importance for the areas such as performance enhancement, dependability, correctness checking and so on. In this paper, we present a formal specification-based online monitoring technique. The key idea of our technique is to build a linking system, which connects a specification...
Hardware/software (HW-SW) partitioning is a key problem in codesign of embedded systems, studied extensively in the past. This paper describes a new approach to hardware/software partitioning for synchronous model. We formalize the partitioning problem using timed automata, which captures the key elements of the partitioning. Then the tabu algorithm is applied to timed automata model to search for...
This paper presents efficient mechanisms for the direct implementation of formal models of highly concurrent dynamic systems. The formalisms captured are CSP (for concurrency) and B (for state transformation). The technology is driving the development of occam-pi, a multiprocessing language based on a careful combination of ideas from Hoare's CSP (giving compositional semantics, refinement and safety/liveness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.