The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software cybernetics is the field of science concerned with processes of communication and control in software systems. In software cybernetics, basic principles of control theory are applied to control the development process and the execution of software systems. In this paper, a notation of negative feedback from control theory is applied to the software system verification. To fulfill the software...
Peer-to-peer systems have gained immense popularity in the recent years, but trustworthiness of the services in P2P systems still remain a major concern. Trust is an important aspect of decision making and particularly influences the specification of security policy. A dependable trust model should be capable of handling the following important issues: dealing with sudden fluctuations in peer behavior,...
The use of component-based software engineering (CBSE) is growing in popularity among the software engineering community and it has been successfully applied in many engineering domains. Component quality evaluations by adequate metrics are needed for large scale project. However, the software quality evaluation should also be performed on component assembly since the overall quality of the CBSE is...
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third authorities to mediate the interactions. A peer will need reputation mechanisms by self-experiencing and incorporating the knowledge of other peers to decide whether to trust another peer in P2P systems. On the basis of introduction on the trust properties and common problems...
We developed a model to investigate the phenomenon of whitewashing in peer-to-peer (P2P) systems. A white washer is a node that leaves the network and re-joins using a different identity. Whitewashing is a common problem in P2P systems and is a difficult to manage properly for reputable systems. The paper discusses the definition and properties of trust, formally represents the node by the labeled...
Software systems are used widely in many applications where a bug in the system can cause large damage. To prove the correctness of the software system by finding the bugs is the most important and the most difficult task. In this paper, we review and discuss the current approaches for software analysis mainly on model checking and testing. Model checking is a proven successful technology but it works...
Trust is an important aspect of decision making for the distributed computing applications such as electronic commerce and particularly influences the specification of security policy. There is often a level of trust associated with a relationship and there is a problem concerning representation of ignorance (or the unknown) with respect to trust. Josang's opinion model, based on subjective logic,...
We investigate the relative computational power of parallel models with shared memory. Based on feasibility considerations present in the literature, we split these models into "lightweight" and "heavyweight," and then find that the heavyweight class is strictly more powerful than the lightweight class, as expected. On the other hand, we contradict the long held belief that the...
We investigate the relative computational power of parallel models with directed reconfigurable buses and the most powerful shared memory model, the broadcast with selective reduction (BSR). We show that these two models have the same computational power in a strong sense. We also show that the Collision write conflict resolution rule is universal on models with directed reconfigurable buses (meaning...
We present an incipient implementation of a programming language that allows programming of real-time applications distributed over a network. We have several goals in mind: First, the language should be built on a sound semantics and offer support for model-based conformance testing. At the same time the language should place the normal programmer (who tends to shy away from exceedingly formal constructs)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.