The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose software engineering sub-ontology. We called it application-specific ontology, for specific software development. It enables remote team members browsing, searching, sharing, and authoring ontological data under the distributed software engineering projects environment. We transform explicit meaningful human knowledge into application-specific ontology, where knowledge structures...
This paper presents the tool chain, methodology, and initial results of a study to provide a thorough, objective, and quantitative analysis of the design alternatives for space software defined radio (SDR) transceivers. The approach taken was to develop a set of models and tools for describing communications requirements, the algorithm resource requirements, the available hardware, and the alternative...
This paper provides an overview of a collaborative research program in information fusion from databases, sensors and simulations. Information fusion entails the combination of data from multiple sources, to generate information that cannot be derived from the individual sources. This area is of strategic importance for industry and defense, as well as public administration areas such as health care,...
Dynamically reconfigurable computing within embedded computer-based systems can be partially modified at runtime without stopping the operation of the whole system. In this paper, a provable algorithm for runtime evolution of a logical configuration is formally represented by the appropriate graph transformation. In other words, programming is considered as a visual transformation of the logical configuration...
In this paper, we describe how Bayesian networks can be used to merge quantitative and qualitative information to support IV&V of use cases. Essentially, simple metrics from the use cases are computed, which are then input to a Bayesian network. This network models the relationships between the observable parameters of an IV&V process for use cases, and the desired features of the requirements...
NASA is investigating the use of swarms of robotic vehicles for future space exploration missions. Such swarms offer many advantages of traditional, single spacecraft, missions. Intelligent swarms offer potential for self-management and survivability, and their emergent properties make such swarms potentially very powerful. However, they are significantly more difficult to design, and ensuring that...
There are various ways to evaluate defect-detection techniques. However, for a comprehensive evaluation the only possibility is to reduce all influencing factors to costs. There are already some models and metrics for the cost of quality that can be used in that context. The existing metrics for the effectiveness and efficiency of defect-detection techniques and experiences with them are combined...
Software product line (SPL) engineering has emerged to become a mature domain for maximizing reuse within the context of a family of related software products. Within the process of SPL, the variability and commonality among the different products within the scope of a family is captured and modeled into a system's `feature model'. Currently, there are no architecture description languages (ADLs)...
The software fault failure rate bound is discussed and generalized for different reliability growth models. The fault introduction during testing and the fault removal efficiency are modeled to relax the two common assumptions made in software reliability models. Three approaches are introduced for the fault content estimation, and thus they are applied to software coverage estimation. A three-state...
The safe and reliable use of concurrency in multi-threaded systems has emerged as a fundamental engineering concern. We recently developed a model of synchronization contracts to address this concern in programs written in object-oriented languages. Programs written using our model comprise modules that declare access requirements in module interfaces in lieu of using low-level synchronization primitives...
The structural stability of an object-oriented design (OOD) refers to the extent to which the structure of the design is preserved throughout the evolution of the software from one release to the next. This paper empirically investigates potential indicators of measures of structural stability of OODs. Both product-related and process-related indicators are considered. These indicators were evaluated...
Assessing risk associated with safety or mission-critical embedded systems often lacks detailed considerations of software, if at all. Performing risk assessment, which considers software in its entirety, is challenging, yet necessary. This necessity stems from the need to understand the contribution of software to the risks associated with a system. We propose a modeling approach that extends dynamic...
The paper presents selected experimental results of evaluating six real-time software development tools for use in safety-critical systems. The experiments were designed to collect data, such as project effort, code size, functionality, traceability, etc., in four stages: preparation, model/code development, measurements, and postmortem. Preliminary experiments were conducted to enable fully controlled...
Large-scale software systems constantly change during system evolution for feature enhancement. Most of the features originate from diverse stakeholders that require their needs to be met despite resource and risk constraints. In such large systems, the number of features requested during the different releases of the system typically exceeds the available resources. Release planning involves decision...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.