首页 > 最新文献

2015 IEEE International Conference on Dependable Systems and Networks Workshops最新文献

英文 中文
Service Deterioration Analysis (SDA): An Early Development Phase Dependability Analysis Method 服务劣化分析(SDA):一种早期开发阶段可靠性分析方法
Georg Macher, Andrea Höller, H. Sporer, E. Armengaud, Christian Kreiner
Dependability is a super ordinate concept regrouping different system attributes such as reliability, safety, security, or availability and a key selling point of modern embedded systems. Dependable systems rely on mature quality management and development methods such as requirements / systems engineering and system analyses. In the automotive domain analysis methods for safety and security attributes at early development phases are well known and partially mandatory by domain standards. Nevertheless, approaches for analysis of serviceability attributes (the combination of reliability and maintainability) at early development phases are not yet available. Aim of the paper is to present a novel analysis method to quantify the impact of individual system parts on the overall system serviceability at early development phases. This approach bases on the concepts of state-of-the-art methods for safety and security analysis and extends their scope of application to serviceability feature quantification, thus enables consistent identification of system dependability target attributes. This, in turn, is a pre-requisite for ensuring a certain level of system dependability from start of development. In the second part of the document the application of the novel approach is demonstrated on an automotive training example of a battery management system.
可靠性是一个超坐标概念,将不同的系统属性(如可靠性、安全性、安全性或可用性)重新组合在一起,也是现代嵌入式系统的一个关键卖点。可靠的系统依赖于成熟的质量管理和开发方法,如需求/系统工程和系统分析。在汽车领域,早期开发阶段的安全性和安全性属性分析方法是众所周知的,并且部分是领域标准强制要求的。然而,在早期开发阶段分析可服务性属性(可靠性和可维护性的组合)的方法尚不可用。本文的目的是提出一种新的分析方法来量化在早期开发阶段单个系统部件对整体系统可服务性的影响。这种方法基于最先进的安全和安全分析方法的概念,并将其应用范围扩展到可服务性特征量化,从而能够一致地识别系统可靠性目标属性。反过来,这是从开发开始就确保一定程度的系统可靠性的先决条件。在本文的第二部分中,将该方法应用于电池管理系统的汽车训练实例。
{"title":"Service Deterioration Analysis (SDA): An Early Development Phase Dependability Analysis Method","authors":"Georg Macher, Andrea Höller, H. Sporer, E. Armengaud, Christian Kreiner","doi":"10.1109/DSN-W.2015.13","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.13","url":null,"abstract":"Dependability is a super ordinate concept regrouping different system attributes such as reliability, safety, security, or availability and a key selling point of modern embedded systems. Dependable systems rely on mature quality management and development methods such as requirements / systems engineering and system analyses. In the automotive domain analysis methods for safety and security attributes at early development phases are well known and partially mandatory by domain standards. Nevertheless, approaches for analysis of serviceability attributes (the combination of reliability and maintainability) at early development phases are not yet available. Aim of the paper is to present a novel analysis method to quantify the impact of individual system parts on the overall system serviceability at early development phases. This approach bases on the concepts of state-of-the-art methods for safety and security analysis and extends their scope of application to serviceability feature quantification, thus enables consistent identification of system dependability target attributes. This, in turn, is a pre-requisite for ensuring a certain level of system dependability from start of development. In the second part of the document the application of the novel approach is demonstrated on an automotive training example of a battery management system.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantifying the Impact of External Attacks on a Distributed Automatic Track Warning System 量化外部攻击对分布式自动航迹预警系统的影响
Leonardo Montecchi, P. Lollini, A. Bondavalli
For several years, the vulnerability of Critical Infrastructures (CIs) to cyber-threats has been limited, since they were mostly isolated systems, using proprietary protocols. Nowadays, CIs are increasingly threatened by external attacks: the use of off-the-shelf components is common, they have become interconnected, and sometimes also connected to the Internet. This problem is exacerbated by the recent trend towards the adoption of wireless connectivity and mobile devices, which is gaining interest also in this domain. One of the main challenges is to quantify the impact that external attacks may have on the infrastructure, and ensure that its dependability and safety requirements can still be fulfilled. In this paper we focus on the ALARP system, which protects workers on the railway infrastructure using distributed mobile terminals, and evaluate the impact of two attacks to the communication infrastructure. In performing such analysis, we experiment with a new method, which combines a stochastic model of the system with a model of the attacker, and quantifies the impact of specific attacks on precise safety and availability metrics.
几年来,关键基础设施(ci)对网络威胁的脆弱性一直很有限,因为它们大多是使用专有协议的孤立系统。如今,ci越来越多地受到外部攻击的威胁:现成组件的使用很常见,它们已经相互连接,有时还连接到Internet。最近无线连接和移动设备的采用趋势加剧了这一问题,这也引起了人们对这一领域的兴趣。主要挑战之一是量化外部攻击可能对基础设施产生的影响,并确保其可靠性和安全性需求仍然可以得到满足。本文重点研究了利用分布式移动终端保护铁路基础设施工作人员的ALARP系统,并评估了两种攻击对通信基础设施的影响。在进行此类分析时,我们尝试了一种新方法,该方法将系统的随机模型与攻击者的模型相结合,并量化特定攻击对精确安全性和可用性指标的影响。
{"title":"Quantifying the Impact of External Attacks on a Distributed Automatic Track Warning System","authors":"Leonardo Montecchi, P. Lollini, A. Bondavalli","doi":"10.1109/DSN-W.2015.22","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.22","url":null,"abstract":"For several years, the vulnerability of Critical Infrastructures (CIs) to cyber-threats has been limited, since they were mostly isolated systems, using proprietary protocols. Nowadays, CIs are increasingly threatened by external attacks: the use of off-the-shelf components is common, they have become interconnected, and sometimes also connected to the Internet. This problem is exacerbated by the recent trend towards the adoption of wireless connectivity and mobile devices, which is gaining interest also in this domain. One of the main challenges is to quantify the impact that external attacks may have on the infrastructure, and ensure that its dependability and safety requirements can still be fulfilled. In this paper we focus on the ALARP system, which protects workers on the railway infrastructure using distributed mobile terminals, and evaluate the impact of two attacks to the communication infrastructure. In performing such analysis, we experiment with a new method, which combines a stochastic model of the system with a model of the attacker, and quantifies the impact of specific attacks on precise safety and availability metrics.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semi-automatic Generation of Extended Finite State Machines from Natural Language Standard Documents 从自然语言标准文档中半自动生成扩展有限状态机
J. Greghi, E. Martins, Ariadne Carvalho
Many requirement documents are written in natural language and, therefore, may contain problems such as inconsistencies and ambiguities. To minimize these problems, there is a trend in Software Engineering to use models to represent systems. These models are obtained from textual requirements. However, manual modelling is a complex task and, in order to do it semi-automatically, one has to deal with problems such as the kind of model to be generated, the automation degree to be achieved, and the quality of the document that must be processed. We propose a methodology to semi-automatically generate Extended Finite State Machines (EFSMs) from natural language standard documents. We used Natural Language Processing (NLP) techniques and tools to extract information from the document, and implemented a prototype which generates EFSMs. The generated EFSMs were validated with a model checking tool, and manually evaluated by comparing them with the manually generated models.
许多需求文档是用自然语言编写的,因此,可能包含诸如不一致和歧义之类的问题。为了最小化这些问题,在软件工程中有一种趋势是使用模型来表示系统。这些模型是从文本需求中获得的。然而,手动建模是一项复杂的任务,为了半自动地完成它,必须处理诸如要生成的模型类型、要实现的自动化程度以及必须处理的文档质量等问题。提出了一种从自然语言标准文档中半自动生成扩展有限状态机(EFSMs)的方法。我们使用自然语言处理(NLP)技术和工具从文档中提取信息,并实现了生成EFSMs的原型。生成的efsm使用模型检查工具进行验证,并通过将它们与手动生成的模型进行比较来手动评估。
{"title":"Semi-automatic Generation of Extended Finite State Machines from Natural Language Standard Documents","authors":"J. Greghi, E. Martins, Ariadne Carvalho","doi":"10.1109/DSN-W.2015.17","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.17","url":null,"abstract":"Many requirement documents are written in natural language and, therefore, may contain problems such as inconsistencies and ambiguities. To minimize these problems, there is a trend in Software Engineering to use models to represent systems. These models are obtained from textual requirements. However, manual modelling is a complex task and, in order to do it semi-automatically, one has to deal with problems such as the kind of model to be generated, the automation degree to be achieved, and the quality of the document that must be processed. We propose a methodology to semi-automatically generate Extended Finite State Machines (EFSMs) from natural language standard documents. We used Natural Language Processing (NLP) techniques and tools to extract information from the document, and implemented a prototype which generates EFSMs. The generated EFSMs were validated with a model checking tool, and manually evaluated by comparing them with the manually generated models.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System 基于资产的洪水预警系统可用性和安全性分析方法
F. Machida, Jianwen Xiang, Kumiko Tadano, S. Hosono
Dependability design of IT services including safety and availability analysis requires expertise and often takes long time to carry out. Efficient analysis of system dependability is thus a key to increase the productivity and quality of system development project in service provider. In this paper, we propose an approach to improve the process of system dependability analysis through asset-based development concept in which safety constraints, system designs, availability models, parameter values and empirical data are incorporated into project asset on the premise of reuse. A structure of asset for dependability analysis along with other software artifacts is presented. Through an example of availability and safety analysis of a flood alert system, we characterize the effectiveness of the asset-based approach.
IT服务的可靠性设计(包括安全性和可用性分析)需要专业知识,并且通常需要很长时间才能完成。因此,系统可靠性的有效分析是提高服务提供商系统开发项目的生产率和质量的关键。本文提出了一种基于资产的开发理念,在复用的前提下,将安全约束、系统设计、可用性模型、参数值和经验数据纳入项目资产中,改进系统可靠性分析过程的方法。提出了一种用于可靠性分析的资产结构以及其他软件构件。通过一个洪水预警系统的可用性和安全性分析的例子,我们描述了基于资产的方法的有效性。
{"title":"An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System","authors":"F. Machida, Jianwen Xiang, Kumiko Tadano, S. Hosono","doi":"10.1109/DSN-W.2015.12","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.12","url":null,"abstract":"Dependability design of IT services including safety and availability analysis requires expertise and often takes long time to carry out. Efficient analysis of system dependability is thus a key to increase the productivity and quality of system development project in service provider. In this paper, we propose an approach to improve the process of system dependability analysis through asset-based development concept in which safety constraints, system designs, availability models, parameter values and empirical data are incorporated into project asset on the premise of reuse. A structure of asset for dependability analysis along with other software artifacts is presented. Through an example of availability and safety analysis of a flood alert system, we characterize the effectiveness of the asset-based approach.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115498659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Use of a Graphic Processing Unit (GPU) in a Real Time Visual Odometry Application 图形处理单元(GPU)在实时视觉里程计应用中的使用
Jaime Armando Delgado Vargas, P. Kurka
This paper presents a practical application of visual odometry (VO). Visual odometry applications are computationally expensive due to the frequent and large number of required data processing. In the present work the application is implemented in a graphics processing unit card (GPU) using compute unified device architecture CUDA and OpenCV libraries, allowing real time processing with a speed of 30 frames per second. The algorithm begins with the capture and processing of stereoscopic images to find invariant interest points (keypoints) using the GPU-OpenCV speed-up robust features (SURF) library implementation. Stereoscopic image points are projected in the Euclidean space to yield 3-D estimates of the robot's translation and rotation movements. The real time VO algorithm is applied in a practical odometry estimation in a robot's outdoors navigation experiment.
本文介绍了视觉里程计的一个实际应用。由于需要频繁和大量的数据处理,视觉里程计应用程序的计算成本很高。在目前的工作中,应用程序是在图形处理单元卡(GPU)上实现的,使用计算统一设备架构CUDA和OpenCV库,允许以每秒30帧的速度进行实时处理。该算法从捕获和处理立体图像开始,利用GPU-OpenCV加速鲁棒特征(SURF)库实现寻找不变兴趣点(关键点)。在欧几里得空间中投影立体图像点,以产生机器人平移和旋转运动的三维估计。将实时VO算法应用于机器人户外导航实验的实际里程估计中。
{"title":"The Use of a Graphic Processing Unit (GPU) in a Real Time Visual Odometry Application","authors":"Jaime Armando Delgado Vargas, P. Kurka","doi":"10.1109/DSN-W.2015.32","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.32","url":null,"abstract":"This paper presents a practical application of visual odometry (VO). Visual odometry applications are computationally expensive due to the frequent and large number of required data processing. In the present work the application is implemented in a graphics processing unit card (GPU) using compute unified device architecture CUDA and OpenCV libraries, allowing real time processing with a speed of 30 frames per second. The algorithm begins with the capture and processing of stereoscopic images to find invariant interest points (keypoints) using the GPU-OpenCV speed-up robust features (SURF) library implementation. Stereoscopic image points are projected in the Euclidean space to yield 3-D estimates of the robot's translation and rotation movements. The real time VO algorithm is applied in a practical odometry estimation in a robot's outdoors navigation experiment.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116013133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Studying the Propagation of Failures in SOAs 研究soa中的故障传播
Cristiana Areias, J. Cunha, M. Vieira
Although Service Oriented Architectures (SOAs) are being increasingly used in business-critical scenarios, the applicability of Verification and Validation (V&V) is still very limited. The problem is that V&V activities have to be implemented at runtime to fit the characteristics of SOA. Recent proposals of runtime V&V techniques specific to SOA domain are far from being complete and a key issue lies in understanding how the "failures propagate" in a dynamic system and how to continuously verify its evolving elements. This paper introduces an approach to deal with the propagation of failures in a SOA environment. The proposed technique is based on three key steps: estimating the failure rate of the individual services, using fault injection to find the exposure of each service to failures from the invoked services, and estimating the impact of each service in the overall architecture. The overall approach is presented with a brief demonstration of its application.
尽管面向服务的体系结构(soa)越来越多地用于关键业务场景,但验证和确认(Verification and Validation, V&V)的适用性仍然非常有限。问题是V&V活动必须在运行时实现,以适应SOA的特征。最近针对SOA领域的运行时V&V技术的建议还远远没有完成,关键问题在于理解“故障”如何在动态系统中传播,以及如何持续地验证其演进的元素。本文介绍了一种在SOA环境中处理故障传播的方法。提出的技术基于三个关键步骤:估计单个服务的故障率,使用故障注入来查找每个服务对被调用服务的故障的暴露,以及估计每个服务在整个体系结构中的影响。提出了总体方法,并简要说明了其应用。
{"title":"Studying the Propagation of Failures in SOAs","authors":"Cristiana Areias, J. Cunha, M. Vieira","doi":"10.1109/DSN-W.2015.18","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.18","url":null,"abstract":"Although Service Oriented Architectures (SOAs) are being increasingly used in business-critical scenarios, the applicability of Verification and Validation (V&V) is still very limited. The problem is that V&V activities have to be implemented at runtime to fit the characteristics of SOA. Recent proposals of runtime V&V techniques specific to SOA domain are far from being complete and a key issue lies in understanding how the \"failures propagate\" in a dynamic system and how to continuously verify its evolving elements. This paper introduces an approach to deal with the propagation of failures in a SOA environment. The proposed technique is based on three key steps: estimating the failure rate of the individual services, using fault injection to find the exposure of each service to failures from the invoked services, and estimating the impact of each service in the overall architecture. The overall approach is presented with a brief demonstration of its application.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114813190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Virtual Fault Injection Framework for Reliability-Aware Software Development 面向可靠性感知软件开发的虚拟故障注入框架
Andrea Höller, Georg Macher, T. Rauter, Johannes Iber, Christian Kreiner
Ever more dependable embedded systems are built with commercial off-the-shelf hardware components that are not intended for highly reliable applications. Consequently, software-based fault tolerance techniques have to maintain a safe operation despite underlying hardware faults. In order to efficiently develop fault tolerant software, fault injection is needed in early development stages. However, common fault injection approaches require manufactured products or detailed hardware models. Thus, these techniques are typically not applicable if software and hardware providers are separate vendors. Additionally, the rise of third-party OTS software components limits the means to inject faults. In this paper, we present a virtual fault injection framework that simulates safety-standard aligned fault models and supports OTS software components as well as widely-used embedded processors such as ARM cores. Additionally, we show how to integrate the framework into various software development stages. Finally, we illustrate the practicability of the approach by exemplifying the integration of the framework in the development of an industrial safety-critical system.
更可靠的嵌入式系统是用商用现成的硬件组件构建的,而这些硬件组件并不打算用于高可靠性的应用程序。因此,基于软件的容错技术必须在底层硬件故障的情况下保持安全运行。为了高效地开发容错软件,需要在软件开发的早期进行故障注入。然而,常见的故障注入方法需要成品或详细的硬件模型。因此,如果软件和硬件供应商是独立的供应商,这些技术通常不适用。此外,第三方OTS软件组件的兴起限制了注入故障的手段。在本文中,我们提出了一个虚拟故障注入框架,它模拟了安全标准对齐的故障模型,并支持OTS软件组件以及广泛使用的嵌入式处理器(如ARM内核)。此外,我们还展示了如何将框架集成到不同的软件开发阶段。最后,我们通过举例说明该框架在工业安全关键系统开发中的集成来说明该方法的实用性。
{"title":"A Virtual Fault Injection Framework for Reliability-Aware Software Development","authors":"Andrea Höller, Georg Macher, T. Rauter, Johannes Iber, Christian Kreiner","doi":"10.1109/DSN-W.2015.16","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.16","url":null,"abstract":"Ever more dependable embedded systems are built with commercial off-the-shelf hardware components that are not intended for highly reliable applications. Consequently, software-based fault tolerance techniques have to maintain a safe operation despite underlying hardware faults. In order to efficiently develop fault tolerant software, fault injection is needed in early development stages. However, common fault injection approaches require manufactured products or detailed hardware models. Thus, these techniques are typically not applicable if software and hardware providers are separate vendors. Additionally, the rise of third-party OTS software components limits the means to inject faults. In this paper, we present a virtual fault injection framework that simulates safety-standard aligned fault models and supports OTS software components as well as widely-used embedded processors such as ARM cores. Additionally, we show how to integrate the framework into various software development stages. Finally, we illustrate the practicability of the approach by exemplifying the integration of the framework in the development of an industrial safety-critical system.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124821240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An Approach to Clustering and Sequencing of Textual Requirements 一种文本需求的聚类和排序方法
R. Barbosa, Daniele Januario, A. E. Silva, Regina L. O. Moraes, Paulo S. Martins
Natural language is often used to write software systems requirements. However, it may be prone to misunderstandings due to its ambiguities. Moreover, it is not easy to modularize these requirements and then find all related ones. In order to find out the impact of requirements in one another, it is necessary to look at every requirement rather than just a group of related requirements. When presented in large numbers, the understanding, organization and sequencing of requirements requires substantial time and effort. In this work, we introduce an approach based both on the clustering of textual requirements and on a data dictionary to organize them, as well as suggest a sequence for their implementation. A case study based on User Stories from Agile processes is introduced to illustrate the approach.
自然语言通常用于编写软件系统需求。然而,由于它的模糊性,容易引起误解。此外,将这些需求模块化并找到所有相关的需求并不容易。为了找出需求对彼此的影响,有必要查看每个需求,而不仅仅是一组相关的需求。当大量出现时,需求的理解、组织和排序需要大量的时间和精力。在这项工作中,我们引入了一种基于文本需求聚类和数据字典的方法来组织它们,并提出了实现它们的顺序。本文介绍了一个基于敏捷过程中的用户故事的案例研究来说明这种方法。
{"title":"An Approach to Clustering and Sequencing of Textual Requirements","authors":"R. Barbosa, Daniele Januario, A. E. Silva, Regina L. O. Moraes, Paulo S. Martins","doi":"10.1109/DSN-W.2015.20","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.20","url":null,"abstract":"Natural language is often used to write software systems requirements. However, it may be prone to misunderstandings due to its ambiguities. Moreover, it is not easy to modularize these requirements and then find all related ones. In order to find out the impact of requirements in one another, it is necessary to look at every requirement rather than just a group of related requirements. When presented in large numbers, the understanding, organization and sequencing of requirements requires substantial time and effort. In this work, we introduce an approach based both on the clustering of textual requirements and on a data dictionary to organize them, as well as suggest a sequence for their implementation. A case study based on User Stories from Agile processes is introduced to illustrate the approach.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues 复杂集成空间系统缺陷类型影响评估:基于ODC和ISVV问题的分析
N. Silva, M. Vieira, D. Ricci, Domenico Cotroneo
Safety or mission critical systems are those where failures should be avoided at all costs. Engineering processes, techniques and tools are, however, not perfect, and lead to software and systems with flaws. This paper presents an analysis of the impact of late found issues versus the fault types for critical aerospace systems. These issues are the independently detected faults that remain once the engineering processes that are required by European space standards have been applied and the engineering teams have performed their verification and validation activities. This study presents the analysis of the fault impact versus fault type distribution according to the detection phases and to the issues severity/type and presents recommendations to improve space systems engineering.
安全或关键任务系统是那些应该不惜一切代价避免故障的系统。然而,工程过程、技术和工具并不完美,会导致软件和系统存在缺陷。本文分析了航空航天关键系统迟发现问题对故障类型的影响。这些问题是在应用了欧洲空间标准所要求的工程流程并且工程团队执行了他们的验证和确认活动后仍然存在的独立检测到的故障。本研究根据检测阶段和问题严重程度/类型对故障影响与故障类型分布进行了分析,并提出了改进空间系统工程的建议。
{"title":"Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues","authors":"N. Silva, M. Vieira, D. Ricci, Domenico Cotroneo","doi":"10.1109/DSN-W.2015.19","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.19","url":null,"abstract":"Safety or mission critical systems are those where failures should be avoided at all costs. Engineering processes, techniques and tools are, however, not perfect, and lead to software and systems with flaws. This paper presents an analysis of the impact of late found issues versus the fault types for critical aerospace systems. These issues are the independently detected faults that remain once the engineering processes that are required by European space standards have been applied and the engineering teams have performed their verification and validation activities. This study presents the analysis of the fault impact versus fault type distribution according to the detection phases and to the issues severity/type and presents recommendations to improve space systems engineering.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cost Prediction for V&V and Certification Processes V&V和认证过程的成本预测
F. Brancati, A. Pataricza, N. Silva, Ábel Hegedüs, László Gönczy, A. Bondavalli, R. Esposito
Cost (time and effort) estimation is fundamental in system and software management. The software related research, together with industries, elaborated and currently use a large number of different cost estimators (CE). While expert judgment is still the most widely used estimation practice in industry, these estimators take a representative calibration set of projects and use a best matching extrapolation curve to predict the costs of further projects. The approach has proven its usefulness in predicting system and software development cost with the breakdown granularity of the main phases of the workflow (specification, implementation, testing etc.). However, there is no such CE for the broad application field of safety critical applications which would be fine granular enough to predict the costs related to Verification and Validation (V&V) and certification. The paper presents an ongoing work for creating such a V&V specific CE. The usefulness of the approach is illustrated by a "what-if" analysis example on the impacts of introducing sophisticated formal methods into the V&V workflow instead of the traditional methodology.
成本(时间和精力)估算是系统和软件管理的基础。与软件相关的研究,连同工业,阐述和目前使用大量不同的成本估算(CE)。虽然专家判断仍然是工业中最广泛使用的估计实践,但这些估计者采用具有代表性的项目校准集,并使用最佳匹配的外推曲线来预测进一步项目的成本。该方法通过工作流的主要阶段(规范、实现、测试等)的细分粒度,在预测系统和软件开发成本方面已被证明是有用的。然而,对于安全关键应用的广泛应用领域,没有这样的CE,这些应用将足够细粒度来预测与验证和验证(V&V)和认证相关的成本。本文介绍了一个正在进行的工作,以创建这样一个V&V特定的CE。该方法的有用性通过一个“假设”分析示例来说明,该示例说明了将复杂的形式化方法引入V&V工作流而不是传统方法的影响。
{"title":"Cost Prediction for V&V and Certification Processes","authors":"F. Brancati, A. Pataricza, N. Silva, Ábel Hegedüs, László Gönczy, A. Bondavalli, R. Esposito","doi":"10.1109/DSN-W.2015.15","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.15","url":null,"abstract":"Cost (time and effort) estimation is fundamental in system and software management. The software related research, together with industries, elaborated and currently use a large number of different cost estimators (CE). While expert judgment is still the most widely used estimation practice in industry, these estimators take a representative calibration set of projects and use a best matching extrapolation curve to predict the costs of further projects. The approach has proven its usefulness in predicting system and software development cost with the breakdown granularity of the main phases of the workflow (specification, implementation, testing etc.). However, there is no such CE for the broad application field of safety critical applications which would be fine granular enough to predict the costs related to Verification and Validation (V&V) and certification. The paper presents an ongoing work for creating such a V&V specific CE. The usefulness of the approach is illustrated by a \"what-if\" analysis example on the impacts of introducing sophisticated formal methods into the V&V workflow instead of the traditional methodology.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 IEEE International Conference on Dependable Systems and Networks Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1