Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755876
Steven J. Cunning, J. Rozenblit
A brief overview of the requirements engineering, its history and state of practice are given. A semi-formal method to structure the behavioral requirements for real-time embedded systems is presented. This method is based on a set of forms that contain both informal text based descriptions and formally defined language constructs. After documentation of requirements into these forms, an algorithm to automatically generate event scenarios is presented. This algorithm extracts the needed information from the requirements forms and produces a set of scenarios that can be used to test transaction oriented systems. A design example is presented that is used to illustrate the process of converting text based requirements onto the structured requirements form and to illustrate the operation of the scenario generation algorithm.
{"title":"Test scenario generation from a structured requirements specification","authors":"Steven J. Cunning, J. Rozenblit","doi":"10.1109/ECBS.1999.755876","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755876","url":null,"abstract":"A brief overview of the requirements engineering, its history and state of practice are given. A semi-formal method to structure the behavioral requirements for real-time embedded systems is presented. This method is based on a set of forms that contain both informal text based descriptions and formally defined language constructs. After documentation of requirements into these forms, an algorithm to automatically generate event scenarios is presented. This algorithm extracts the needed information from the requirements forms and produces a set of scenarios that can be used to test transaction oriented systems. A design example is presented that is used to illustrate the process of converting text based requirements onto the structured requirements form and to illustrate the operation of the scenario generation algorithm.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"635 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755869
Dai Araki, Tadatoshi Ishii, D. Gajski
The paper describes a visual design authoring tool named VisualSpec. VisualSpec realizes a homogeneous hardware/software codesign process which means to perform both functional specification design and architectural specification design of HW/SW parts in a single tool and a common design specification language. The design specification captured with VisualSpec is always executable so that the designer can develop a virtual prototype system and simulation model for verifying functional requirements, performance and cost. VisualSpec combines top-down and bottom-up design approaches and facilitates reuse of cores and other IP components.
{"title":"Rapid prototyping with HW/SW codesign tool","authors":"Dai Araki, Tadatoshi Ishii, D. Gajski","doi":"10.1109/ECBS.1999.755869","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755869","url":null,"abstract":"The paper describes a visual design authoring tool named VisualSpec. VisualSpec realizes a homogeneous hardware/software codesign process which means to perform both functional specification design and architectural specification design of HW/SW parts in a single tool and a common design specification language. The design specification captured with VisualSpec is always executable so that the designer can develop a virtual prototype system and simulation model for verifying functional requirements, performance and cost. VisualSpec combines top-down and bottom-up design approaches and facilitates reuse of cores and other IP components.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123730214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Communications systems will have to support diverse services, which will lead to more complicated software within those systems. This will be a problem particularly because of the system's inability to meet required real-time constraints. This paper describes an object-oriented model based on functional layers for switching systems. Our model enables to improve the productivity, maintainability, and expandability of software while retaining its real-time capability of communications systems. To verify the effectiveness of the model, we implemented it on a computer and telephony integration (CTI) system, and provide the Voice over IP (VoIP) functions.
{"title":"Object-oriented design methodology based on functional layers for distributed communications systems","authors":"Yasufumi Nagayama, Masashi Nabeta, Hiroshi Fujimoto, Atsushi Takeuchi","doi":"10.1109/ECBS.1999.755882","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755882","url":null,"abstract":"Communications systems will have to support diverse services, which will lead to more complicated software within those systems. This will be a problem particularly because of the system's inability to meet required real-time constraints. This paper describes an object-oriented model based on functional layers for switching systems. Our model enables to improve the productivity, maintainability, and expandability of software while retaining its real-time capability of communications systems. To verify the effectiveness of the model, we implemented it on a computer and telephony integration (CTI) system, and provide the Voice over IP (VoIP) functions.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127912451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755889
J. R. Davis, J. Scott, J. Sztipanovits, Marcus Martinez
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science that permits an engineer to qualitatively and quantitatively predict and assess the completeness and predictability of a design. Surety is a term often used in the Department of Defense (DoD) and Department of Energy (DOE) communities, which refers to the integration of safety, security, reliability and performance aspects of design. Current risk assessment technologies for analyzing complex systems fail to adequately describe the problem, thus making assessment fragmented and non-integrated. To address this problem, we have developed a methodology and extensible software toolset to address model integration and complexity for high consequence systems. The MultiGraph Architecture (MGA) facilitates multi-domain, model-integrated modeling and analyses of complex, high-assurance systems. The MGA modeling environment allows the engineer to customize the modeling environment to match a design paradigm representative of the actual design. Previous modeling tools have a predefined model space that forces the modeler to work in less than optimal environments. Current approaches force the problem to be bounded and constrained by requirements of the modeling tool and not the actual design problem. In some small cases, this is only marginally adequate. The MGA facilitates the implementation of a surety methodology, which is used to represent high assurance systems with respect to safety and reliability. Formal mathematical models are used to correctly describe design safety and reliability functionality and behavior. The functional and behavioral representations of the design are then analyzed using commercial-off-the-shelf (COTS) tools.
{"title":"Multi-domain surety modeling and analysis for high assurance systems","authors":"J. R. Davis, J. Scott, J. Sztipanovits, Marcus Martinez","doi":"10.1109/ECBS.1999.755889","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755889","url":null,"abstract":"Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science that permits an engineer to qualitatively and quantitatively predict and assess the completeness and predictability of a design. Surety is a term often used in the Department of Defense (DoD) and Department of Energy (DOE) communities, which refers to the integration of safety, security, reliability and performance aspects of design. Current risk assessment technologies for analyzing complex systems fail to adequately describe the problem, thus making assessment fragmented and non-integrated. To address this problem, we have developed a methodology and extensible software toolset to address model integration and complexity for high consequence systems. The MultiGraph Architecture (MGA) facilitates multi-domain, model-integrated modeling and analyses of complex, high-assurance systems. The MGA modeling environment allows the engineer to customize the modeling environment to match a design paradigm representative of the actual design. Previous modeling tools have a predefined model space that forces the modeler to work in less than optimal environments. Current approaches force the problem to be bounded and constrained by requirements of the modeling tool and not the actual design problem. In some small cases, this is only marginally adequate. The MGA facilitates the implementation of a surety methodology, which is used to represent high assurance systems with respect to safety and reliability. Formal mathematical models are used to correctly describe design safety and reliability functionality and behavior. The functional and behavioral representations of the design are then analyzed using commercial-off-the-shelf (COTS) tools.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755870
N. Abu-Ghazaleh, M. Rangarajan, Darryl D. Dieckman, P. Alexander, P. Wilsey
The development of large systems relies on the ability to manage complexity throughout the design cycle. Decomposition and component based design contribute substantially to effective design practice. In addition, maintaining heterogeneous models of the system allows separation of concerns; different analysis tools utilize different views of the model to assess the correctness and requirement satisfaction of the design in a complementary fashion. The paper presents a design framework that supports heterogeneous component based analysis and design. The design portion of the framework encapsulates a component such that different representations (including decomposition representations) are associated with each component. Top down and bottom up design as well as component reuse are supported naturally. Using configurations, the design tree is pruned to obtain a specific view of the design for analysis purposes. The analysis model allows composition of analyses to create analysis plans and to use different types of analyses collaboratively. An associated CAD environment provides useful distractions of the framework. The framework can be extended to support any component based design domain.
{"title":"ORBIT: an environment for component-based heterogeneous design and analysis","authors":"N. Abu-Ghazaleh, M. Rangarajan, Darryl D. Dieckman, P. Alexander, P. Wilsey","doi":"10.1109/ECBS.1999.755870","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755870","url":null,"abstract":"The development of large systems relies on the ability to manage complexity throughout the design cycle. Decomposition and component based design contribute substantially to effective design practice. In addition, maintaining heterogeneous models of the system allows separation of concerns; different analysis tools utilize different views of the model to assess the correctness and requirement satisfaction of the design in a complementary fashion. The paper presents a design framework that supports heterogeneous component based analysis and design. The design portion of the framework encapsulates a component such that different representations (including decomposition representations) are associated with each component. Top down and bottom up design as well as component reuse are supported naturally. Using configurations, the design tree is pruned to obtain a specific view of the design for analysis purposes. The analysis model allows composition of analyses to create analysis plans and to use different types of analyses collaboratively. An associated CAD environment provides useful distractions of the framework. The framework can be extended to support any component based design domain.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755880
F. Kurfess, Dhaval P. Shah, Klaus Holthaus, F. Miralles
This paper describes a platform-independent application for the monitoring of distributed applications. The tool is intended for system administrators to properly distribute the components of a distributed application onto particular machines. An essential part of this tool is based on intelligent mobile agent technology used to access the target systems. Although a full implementation turned out to be infeasible due to security considerations, the implementation and experimentation indicate the suitability of intelligent agents technology for such purposes.
{"title":"Monitoring distributed processes with intelligent agents","authors":"F. Kurfess, Dhaval P. Shah, Klaus Holthaus, F. Miralles","doi":"10.1109/ECBS.1999.755880","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755880","url":null,"abstract":"This paper describes a platform-independent application for the monitoring of distributed applications. The tool is intended for system administrators to properly distribute the components of a distributed application onto particular machines. An essential part of this tool is based on intelligent mobile agent technology used to access the target systems. Although a full implementation turned out to be infeasible due to security considerations, the implementation and experimentation indicate the suitability of intelligent agents technology for such purposes.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"51 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132801790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755896
Á. Lédeczi, M. Maróti, G. Karsai, G. Nordstrom
Model-integrated computing, specifically model-integrated program synthesis (MIPS) environments that include visual model building, constraint management, and automatic program synthesis components, are well suited for the design and implementation of complex computer based systems. However, building such an environment from scratch for each new domain can be cost-prohibitive. This paper presents a toolkit that makes the rapid creation of MIPS environments possible through metaprogramming.
{"title":"Metaprogrammable toolkit for model-integrated computing","authors":"Á. Lédeczi, M. Maróti, G. Karsai, G. Nordstrom","doi":"10.1109/ECBS.1999.755896","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755896","url":null,"abstract":"Model-integrated computing, specifically model-integrated program synthesis (MIPS) environments that include visual model building, constraint management, and automatic program synthesis components, are well suited for the design and implementation of complex computer based systems. However, building such an environment from scratch for each new domain can be cost-prohibitive. This paper presents a toolkit that makes the rapid creation of MIPS environments possible through metaprogramming.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128109979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755888
A. Behforooz, Frederick Hudson
More and more frequently computer/software systems are finding their way into applications wherein both real-time requirements and public or user safety requirements are explicit. The design and development of real-time systems/software requires unique system and software engineering. The development and delivery of software products whose continued successful performance is essential to operational safety and whose failure can lead to loss of life or a significant financial impact also requires a unique software engineering approach. The confluence of these requirements in a single software application is one of the most challenging software development problems. The purpose of this paper is to provide a general discussion of the unique system/software engineering concerns associated with development of software products for real-time applications involving public or user safety or the potential for significant financial loss.
{"title":"Software engineering for real-time high reliability applications","authors":"A. Behforooz, Frederick Hudson","doi":"10.1109/ECBS.1999.755888","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755888","url":null,"abstract":"More and more frequently computer/software systems are finding their way into applications wherein both real-time requirements and public or user safety requirements are explicit. The design and development of real-time systems/software requires unique system and software engineering. The development and delivery of software products whose continued successful performance is essential to operational safety and whose failure can lead to loss of life or a significant financial impact also requires a unique software engineering approach. The confluence of these requirements in a single software application is one of the most challenging software development problems. The purpose of this paper is to provide a general discussion of the unique system/software engineering concerns associated with development of software products for real-time applications involving public or user safety or the potential for significant financial loss.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123586713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755883
D. Oliver
This paper models the concept analysis of a new, freight locomotive product as an example of the critical importance of ECBS to modern product development and organization evolution. It combines the producer business strategy with the purchasing railroad needs and the needs of the railroad customers. Modeling techniques are shown for requirements elicitation. The results are tied to technical engineering effectiveness measures using both analytical techniques and the less formal methods common to TQM and Six Sigma approaches. As the example progresses there is an identification and presentation of critical engineering performance calculations and trade-off to establish system level design tied directly to customer perceived value and quality and to business strategy. As the locomotive design changes emerge, concurrent changes to the business structure, organization and motivation factors also emerge. ECBS is critical to both the new engineering designs and to the organizational transformations because the changes are driven technically by control and information science advances and cost reductions.
{"title":"ECBS in concept analysis and organization transformation","authors":"D. Oliver","doi":"10.1109/ECBS.1999.755883","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755883","url":null,"abstract":"This paper models the concept analysis of a new, freight locomotive product as an example of the critical importance of ECBS to modern product development and organization evolution. It combines the producer business strategy with the purchasing railroad needs and the needs of the railroad customers. Modeling techniques are shown for requirements elicitation. The results are tied to technical engineering effectiveness measures using both analytical techniques and the less formal methods common to TQM and Six Sigma approaches. As the example progresses there is an identification and presentation of critical engineering performance calculations and trade-off to establish system level design tied directly to customer perceived value and quality and to business strategy. As the locomotive design changes emerge, concurrent changes to the business structure, organization and motivation factors also emerge. ECBS is critical to both the new engineering designs and to the organizational transformations because the changes are driven technically by control and information science advances and cost reductions.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129807690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-03-07DOI: 10.1109/ECBS.1999.755858
S. Harmon
This paper proposes a rigorous technique to evaluate the architectural design of an information system and illustrates this technique by applying it to the JSIMS architecture. This technique represents an information system problem as a graph of necessary decisions and the information flows needed to support those decisions. It represents the architectural design as a graph of data interfaces, knowledge stores, decision makers and communications. Rules of information flow mapping the problem model onto the architectural model clearly show what decisions and information flows the design does and does not support. These design strengths and weaknesses emphasize where design improvements can reduce technical, cost and schedule risks. Architecture's ability to address the problem of composing simulation exercises was evaluated. This evaluation indicates that the JSIMS architecture can support exercise composition but cannot provide the functionality needed to achieve the staffing reduction targets for JSIMS.
{"title":"Application of a technique for evaluating information system architectural designs","authors":"S. Harmon","doi":"10.1109/ECBS.1999.755858","DOIUrl":"https://doi.org/10.1109/ECBS.1999.755858","url":null,"abstract":"This paper proposes a rigorous technique to evaluate the architectural design of an information system and illustrates this technique by applying it to the JSIMS architecture. This technique represents an information system problem as a graph of necessary decisions and the information flows needed to support those decisions. It represents the architectural design as a graph of data interfaces, knowledge stores, decision makers and communications. Rules of information flow mapping the problem model onto the architectural model clearly show what decisions and information flows the design does and does not support. These design strengths and weaknesses emphasize where design improvements can reduce technical, cost and schedule risks. Architecture's ability to address the problem of composing simulation exercises was evaluated. This evaluation indicates that the JSIMS architecture can support exercise composition but cannot provide the functionality needed to achieve the staffing reduction targets for JSIMS.","PeriodicalId":229109,"journal":{"name":"Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}