The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
paper addresses "the 2-chart problem, " with respect to diagrammatic representations of complex event-driven reactive systems. In particular we focus on behavioral modeling with statecharts. A taxonomy of cues and a heuristic for using them is proposed. This facilitates consideration of behavioral issues of each chart individually. The more complex issues that arise from consideration of...
A discrete control system, with stringent hardware constraints, is effectively an embedded real-time system and hence requires a rigorous methodology to develop the software involved. The development methodology proposed in this paper adapts agile principles and patterns to support the building of embedded control systems, focusing on the issues relating to a system's constraints and safety. Strong...
With the adoption of MDE, application evolution is facilitated. Instead of modifying each deployed version, the application is modified only once at the model level and then regenerated for each platform. On the other hand, to manage application complexity, models are partitioned and then integrated together to form larger ones. However most of modeling approaches use an integration mechanism based...
The existing weather forecasting models have limitations incorporating complexity and dynamism associated with weather forecasts. In order to overcome such limitations, this paper presents the application of nature-inspired GITIC Model for weather forecasts. The GITIC model, inspired from the human gastro-intestinal tract (GIT) defense system, has been employed to formulate a generic, dynamic, and...
In a component-based software system, components are black boxes communicating through their interfaces, possibly using adapters. The verification of interoperability between the different components is a crucial issue to guarantee the trustworthy of the system as well as its correct realization. We present a systematic approach based on UML, the B method and its support tools to verify the correctness...
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situations. In this paper, we introduce a formal method approach for verification of security constraints on networks with dynamic routing protocols in use. A unifying model based on packet-filters is employed for modelling of network...
This paper discusses the design and implementation of a geocomputing platform for the development of location-based services(LBS) focusing mobile mapping. During the analysis, design, and implementation of the geocomputing platform, an effective method was identified for the real-time processing of geographic information acquired by a camera attached to a PDA. This combines location information given...
We introduce an improved version of the equational abstraction for rewrite theories in which the temporal logic used handles also maximal finite paths and the representation of the atomic propositions, by itself can not lead to useless abstractions. Afterward, we establish a counterexample guided abstraction refinement procedure under equational abstraction and we prove by a consistent example that...
Steganography is defined as the science of hiding or embedding ";data"; in a transmission medium. Its ultimate objectives, which are undetectability, robustness (i.e., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other "; sisters-in science"; techniques,...
Synchronous languages have been introduced to provide safety-critical system designers with a formal means of creating trusted designs. The compilers for these languages analyze programs to prove their correctness, and automatically transform them into executable code. In SIGNAL, the compiler has a clock abstraction to support the efficient determination of whether or not program variables occur at...
Summary form only given. System complexity is a challenge both with regard to defining and agreeing on basic concepts of system dependability, and to actually achieving such dependability in practice from large computer-based systems. In this talk the author discusses such issues, and give a brief description of some recent work on a new approach to formally modelling and analysing the activity of...
With transistor counts increasing at a rate of 58% per year and design productivity only growing at 21% per year, there is an important need to develop new design approaches to close this gap. This paper outlines the process by which IP cores are generated and shows how the design methodology can be improved to enhance their usability. The process is demonstrated using a recursive least squares (RLS)...
Models are widely used for communication and documentation purposes. They also tend to be used as parameters for code generation. Because these models have to be complete, consistent and correct we have to support modellers in keeping their models clean. The modeller should have the choice to select the preferred view and the needed level of detail for his modelling and model maintenance tasks. This...
Clinical guidelines and protocols are used to aid decision making in health care. This paper presents a model- based approach to the development of decision support systems for clinical guidelines. The guidelines are modelled using the UML Statechart language and the final system is automatically generated using an automated model transformation. Our approach is illustrated with a Spanish clinical...
A key process in software product line (SPL) engineering is product derivation, which is the process of building software products from a base set of core assets. During product derivation, the components in both core assets and derived software products are modified to meet needs for different functionality, platforms, quality attributes, etc. However, existing software configuration management (SCM)...
Reused software artefacts guarantee their quality and suitable functionality because they have been tested and used before. As a consequence, commercial off-the-shelf (COTS) importation has acquired relevance in the last few years. This paper presents a proposal for integrating COTS into aspect-oriented architectural models that are developed and maintained following the model-driven development (MDD)...
This paper reports on a collaborative project between clinicians at the Ulster Hospital and researchers at the University of Ulster to produce a Web-based system for monitoring patients with Type 2 diabetes. The typical method of recording measurements of weight, blood sugar, and blood pressure allows for minimal intervention for the consultants as the paper-based records can only be reviewed at three...
This paper describes how UML 2 Activity diagrams can be intuitively translated into Petri net notations. The UML2 specification states that activities are based on Petri net semantics. The transformation of UML 2 Activity diagrams into Petri net semantics have been researched for various reasons. Translating UML activities into Petri nets creates new problems. The Petri net diagrams are (i) more complex...
Software systems have to provide flexibility by implementing variability. Existing design methodologies do not support means for optimizing the design for variability and for measuring the overhead effort. Therefore, the solutions cannot be optimized regarding a minimal overhead for variability. Other methods are lacking of a traceability for variability mechanisms, or do not provide means for measuring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.