首页 > 最新文献

Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering最新文献

英文 中文
UML-based analysis of embedded systems using a mapping to VHDL 基于uml的嵌入式系统分析,使用映射到VHDL
William E. McUmber, B. Cheng
Methods for developing and modeling embedded systems and rigorously verifying behavior before committing to code are increasingly important. A number of object-oriented techniques and notations have been introduced but recently, it appears that the Unified Modeling Language (UML) could be a notation broad enough in scope to represent a variety of domains and gain widespread use. Currently, however, UML is only a notation, with no formal semantics attached to the individual diagrams. In order to address this problem, we have developed a framework for deriving VHDL specifications from the class and state diagrams in order to capture the structure and the behavior of embedded systems. The derived VHDL specifications enable us to perform behavior simulation of the UML models.
开发和建模嵌入式系统的方法以及在提交代码之前严格验证行为的方法变得越来越重要。已经引入了许多面向对象的技术和符号,但最近,统一建模语言(UML)似乎可以成为一种范围足够广泛的符号,以表示各种领域并获得广泛使用。然而,目前UML只是一种符号,没有附加到单个图的正式语义。为了解决这个问题,我们开发了一个框架,用于从类和状态图派生VHDL规范,以捕获嵌入式系统的结构和行为。派生的VHDL规范使我们能够执行UML模型的行为模拟。
{"title":"UML-based analysis of embedded systems using a mapping to VHDL","authors":"William E. McUmber, B. Cheng","doi":"10.1109/HASE.1999.809475","DOIUrl":"https://doi.org/10.1109/HASE.1999.809475","url":null,"abstract":"Methods for developing and modeling embedded systems and rigorously verifying behavior before committing to code are increasingly important. A number of object-oriented techniques and notations have been introduced but recently, it appears that the Unified Modeling Language (UML) could be a notation broad enough in scope to represent a variety of domains and gain widespread use. Currently, however, UML is only a notation, with no formal semantics attached to the individual diagrams. In order to address this problem, we have developed a framework for deriving VHDL specifications from the class and state diagrams in order to capture the structure and the behavior of embedded systems. The derived VHDL specifications enable us to perform behavior simulation of the UML models.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114547008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Identifying domain axioms using binary decision diagrams 使用二元决策图识别领域公理
Barbara J. Czerny, M. Heimdahl
Statically analyzing requirements specifications to assure that they possess desirable properties is a useful activity in any rigorous software development project. The analysis is performed on an abstraction of the original requirements specification. The abstractions in the model may lead to spurious errors in the analysis output. Spurious errors are errors that are reported to occur under certain conditions, but information abstracted from the model precludes the conditions from being satisfied in the original model. A high ratio of spurious errors to true errors in the analysis output makes it difficult, error-prone, and time consuming to find and correct the true errors. In this paper we describe a technique that uses binary decision diagrams to help the analyst identify the abstractions that are lending to excessive spurious errors in the analysis output. Information about these abstractions can then be incorporated into the analysis to eliminate the corresponding spurious error reports.
在任何严格的软件开发项目中,静态分析需求规范以确保它们具有理想的属性是一项有用的活动。分析是在原始需求规范的抽象上执行的。模型中的抽象可能导致分析输出中出现虚假错误。虚假错误是在某些条件下报告发生的错误,但从模型中抽象的信息排除了原始模型中满足的条件。分析输出中假错误与真错误的高比率使得查找和纠正真错误变得困难、容易出错且耗时。在本文中,我们描述了一种使用二元决策图来帮助分析人员识别在分析输出中导致过多虚假错误的抽象的技术。然后,可以将有关这些抽象的信息合并到分析中,以消除相应的虚假错误报告。
{"title":"Identifying domain axioms using binary decision diagrams","authors":"Barbara J. Czerny, M. Heimdahl","doi":"10.1109/HASE.1999.809488","DOIUrl":"https://doi.org/10.1109/HASE.1999.809488","url":null,"abstract":"Statically analyzing requirements specifications to assure that they possess desirable properties is a useful activity in any rigorous software development project. The analysis is performed on an abstraction of the original requirements specification. The abstractions in the model may lead to spurious errors in the analysis output. Spurious errors are errors that are reported to occur under certain conditions, but information abstracted from the model precludes the conditions from being satisfied in the original model. A high ratio of spurious errors to true errors in the analysis output makes it difficult, error-prone, and time consuming to find and correct the true errors. In this paper we describe a technique that uses binary decision diagrams to help the analyst identify the abstractions that are lending to excessive spurious errors in the analysis output. Information about these abstractions can then be incorporated into the analysis to eliminate the corresponding spurious error reports.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129329409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assurance-based Y2K testing 基于保证的Y2K测试
W. Tsai, W. Shao, Sanjai Rayadurgam, Jinbao Li, R. Paul
Describes assurance techniques for Year-2000 (Y2K) testing. The Y2K problem is an important issue in the computer industry today, and testing is still the main technique for quality assurance. There is a need to ensure that the software is reasonably safe from Y2K faults after testing. This paper uses a statistical model for ensuring this, and it explicitly models Y2K faults as well as the ripples induced by Y2K modifications. The paper then describes two processes that use the model in practice: a bottom-up process that can be used together with software development, and a top-down process that can be used when the project is almost completed. These processes can be easily embedded in an existing testing process with minimal changes and minimal extra effort.
介绍2000年(Y2K)测试的保证技术。千年虫问题是当今计算机行业的一个重要问题,测试仍然是质量保证的主要技术。有必要确保软件在经过测试后是相当安全的,不会出现Y2K故障。为了保证这一点,本文使用了一个统计模型,它明确地模拟了Y2K故障以及由Y2K修改引起的涟漪。然后,论文描述了在实践中使用该模型的两个过程:一个可以与软件开发一起使用的自底向上过程,以及一个可以在项目几乎完成时使用的自顶向下过程。这些过程可以很容易地嵌入到现有的测试过程中,只需要很少的更改和额外的努力。
{"title":"Assurance-based Y2K testing","authors":"W. Tsai, W. Shao, Sanjai Rayadurgam, Jinbao Li, R. Paul","doi":"10.1109/HASE.1999.809472","DOIUrl":"https://doi.org/10.1109/HASE.1999.809472","url":null,"abstract":"Describes assurance techniques for Year-2000 (Y2K) testing. The Y2K problem is an important issue in the computer industry today, and testing is still the main technique for quality assurance. There is a need to ensure that the software is reasonably safe from Y2K faults after testing. This paper uses a statistical model for ensuring this, and it explicitly models Y2K faults as well as the ripples induced by Y2K modifications. The paper then describes two processes that use the model in practice: a bottom-up process that can be used together with software development, and a top-down process that can be used when the project is almost completed. These processes can be easily embedded in an existing testing process with minimal changes and minimal extra effort.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
DynaMICs: an automated and independent software-fault detection approach 动态:一种自动化和独立的软件故障检测方法
A. Gates, P. Teller
Computers are omnipresent in our society, creating a reliance that demands high-assurance systems. Traditional verification and validation approaches may not be sufficient to identify the existence of software faults. Dynamic Monitoring with Integrity Constraints (DynaMICs) augments existing approaches by including: (1) elicitation of constraints from domain experts and developers that capture knowledge about real-world objects, assumptions and limitations, (2) constraints stored and maintained separate from the program, (3) automatic generation of monitoring code and program instrumentation, (4) performance-friendly monitoring, and (5) tracing among specifications, code and documentation. The primary motivation for DynaMICs is to facilitate the detection of faults, in particular those that result from insufficient communication, changes in intended software use and errors introduced through external interfaces. After presenting related work and an overview of DynaMICs, this paper outlines the methodology used to provide an automated and independent software-fault detection system.
计算机在我们的社会中无处不在,创造了一种对高保证系统的依赖。传统的验证和确认方法可能不足以识别软件故障的存在。带有完整性约束的动态监控(DynaMICs)通过以下方式增强了现有的方法:(1)从领域专家和开发人员那里获取约束,这些约束捕获了关于现实世界对象、假设和限制的知识;(2)与程序分开存储和维护的约束;(3)自动生成监控代码和程序工具;(4)性能友好型监控;(5)规范、代码和文档之间的跟踪。DynaMICs的主要动机是促进故障的检测,特别是那些由于通信不足、预期软件使用的更改和通过外部接口引入的错误而导致的故障。在介绍了相关工作和动力学概述之后,本文概述了用于提供自动化和独立软件故障检测系统的方法。
{"title":"DynaMICs: an automated and independent software-fault detection approach","authors":"A. Gates, P. Teller","doi":"10.1109/HASE.1999.809470","DOIUrl":"https://doi.org/10.1109/HASE.1999.809470","url":null,"abstract":"Computers are omnipresent in our society, creating a reliance that demands high-assurance systems. Traditional verification and validation approaches may not be sufficient to identify the existence of software faults. Dynamic Monitoring with Integrity Constraints (DynaMICs) augments existing approaches by including: (1) elicitation of constraints from domain experts and developers that capture knowledge about real-world objects, assumptions and limitations, (2) constraints stored and maintained separate from the program, (3) automatic generation of monitoring code and program instrumentation, (4) performance-friendly monitoring, and (5) tracing among specifications, code and documentation. The primary motivation for DynaMICs is to facilitate the detection of faults, in particular those that result from insufficient communication, changes in intended software use and errors introduced through external interfaces. After presenting related work and an overview of DynaMICs, this paper outlines the methodology used to provide an automated and independent software-fault detection system.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126087849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
COTS-based fault tolerance in deep space: Qualitative and quantitative analyses of a bus network architecture 基于cots的深空容错:总线网络体系结构的定性和定量分析
A. Tai, S. Chau, L. Alkalai
Among the COTS applications in the X2000 architecture for deep-space missions, the use of commercial bus standards is the highest-payoff COTS application since a bus interface has a global impact and enabling effect on system cost and capability, respectively. While COTS bus standards enable significant cost reductions, it is a great challenge for us to deliver a highly-reliable long-term survivable system employing COTS standards that are not developed for mission-critical applications. The spirit of our solution to the problem is to exploit the pertinent standard features of a COTS product to circumvent its shortcomings, though these standard features may not be originally designed for highly reliable systems. In this paper we discuss our experiences and findings on the design and assessment of an IEEE 1394 compliant fault-tolerant bus architecture. We first derive and qualitatively analyze a "stack-tree topology" that not only complies with IEEE 1394 but also enables the implementation of a fault-tolerant bus architecture without node redundancy. We then present a quantitative evaluation that demonstrates significant reliability improvement from the COTS-based fault tolerance.
在用于深空任务的X2000架构的COTS应用中,商用总线标准的使用是收益最高的COTS应用,因为总线接口分别对系统成本和能力具有全局影响和启用效应。虽然COTS总线标准能够显著降低成本,但对于我们来说,采用COTS标准交付高可靠的长期生存系统是一个巨大的挑战,这些标准不是为关键任务应用开发的。我们解决问题的精神是利用COTS产品的相关标准特性来规避其缺点,尽管这些标准特性最初可能不是为高度可靠的系统设计的。在本文中,我们讨论了我们在设计和评估符合IEEE 1394的容错总线体系结构方面的经验和发现。我们首先推导并定性分析了一种“堆栈树拓扑”,它不仅符合IEEE 1394,而且能够实现无节点冗余的容错总线架构。然后,我们提出了一个定量评估,证明了基于cots的容错性显著提高了可靠性。
{"title":"COTS-based fault tolerance in deep space: Qualitative and quantitative analyses of a bus network architecture","authors":"A. Tai, S. Chau, L. Alkalai","doi":"10.1109/HASE.1999.809480","DOIUrl":"https://doi.org/10.1109/HASE.1999.809480","url":null,"abstract":"Among the COTS applications in the X2000 architecture for deep-space missions, the use of commercial bus standards is the highest-payoff COTS application since a bus interface has a global impact and enabling effect on system cost and capability, respectively. While COTS bus standards enable significant cost reductions, it is a great challenge for us to deliver a highly-reliable long-term survivable system employing COTS standards that are not developed for mission-critical applications. The spirit of our solution to the problem is to exploit the pertinent standard features of a COTS product to circumvent its shortcomings, though these standard features may not be originally designed for highly reliable systems. In this paper we discuss our experiences and findings on the design and assessment of an IEEE 1394 compliant fault-tolerant bus architecture. We first derive and qualitatively analyze a \"stack-tree topology\" that not only complies with IEEE 1394 but also enables the implementation of a fault-tolerant bus architecture without node redundancy. We then present a quantitative evaluation that demonstrates significant reliability improvement from the COTS-based fault tolerance.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Lessons from 342 medical device failures 342起医疗器械故障的教训
D. Wallace, D. R. Kuhn
Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and software quality assurance. This paper presents an analysis of software-related failures of medical devices that caused no death or injury but led to recalls by the manufacturers. The analysis categorizes the failures by their symptoms and faults, and discusses methods of preventing and detecting faults in each category. The nature of the faults provides lessons about the value of generally accepted quality practices for prevention and detection methods applied prior to system release. It also provides some insight into the need for formal requirements specification and for improved testing of complex hardware-software systems.
今天,大多数复杂的系统都包含软件,由软件故障引起的系统故障可以为软件开发实践和软件质量保证提供经验教训。本文提出了一个分析与软件相关的医疗设备故障,没有造成死亡或伤害,但导致召回的制造商。分析通过故障的症状和故障对故障进行分类,并讨论了每一类故障的预防和检测方法。故障的性质提供了关于在系统发布之前应用的预防和检测方法的普遍接受的质量实践的价值的教训。它还提供了对正式需求规范和改进复杂硬件软件系统测试的需求的一些见解。
{"title":"Lessons from 342 medical device failures","authors":"D. Wallace, D. R. Kuhn","doi":"10.1109/HASE.1999.809487","DOIUrl":"https://doi.org/10.1109/HASE.1999.809487","url":null,"abstract":"Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and software quality assurance. This paper presents an analysis of software-related failures of medical devices that caused no death or injury but led to recalls by the manufacturers. The analysis categorizes the failures by their symptoms and faults, and discusses methods of preventing and detecting faults in each category. The nature of the faults provides lessons about the value of generally accepted quality practices for prevention and detection methods applied prior to system release. It also provides some insight into the need for formal requirements specification and for improved testing of complex hardware-software systems.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127173195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Predicting fault-prone software modules in embedded systems with classification trees 基于分类树的嵌入式系统易故障软件模块预测
T. Khoshgoftaar, E. B. Allen
Embedded-computer systems have become essential elements of the modern world. For example, telecommunications systems are the backbone of society's information infrastructure. Embedded systems must have highly reliable software. The consequences of failures may be severe; down-time may not be tolerable; and repairs in remote locations are often expensive. Moreover, today's fast-moving technology marketplace mandates that embedded systems evolve, resulting in multiple software releases embedded in multiple products. Software quality models can be valuable tools for software engineering of embedded systems, because some software-enhancement techniques are so expensive or time-consuming that it is not practical to apply them to all modules. Targeting such enhancement techniques is an effective way to reduce the likelihood of faults discovered in the field. Research has shown software metrics to be useful predictors of software faults. A software quality model is developed using measurements and fault data from a past release. The calibrated model is then applied to modules currently under development. Such models yield predictions on a module-by-module basis. This paper examines the Classification And Regression Trees (CART) algorithm for predicting which software modules have high risk of faults to be discovered during operations. CART is attractive because it emphasizes pruning to achieve robust models. This paper presents details on the CART algorithm in the context of software engineering of embedded systems. We illustrate this approach with a case study of four consecutive releases of software embedded in a large telecommunications system. The level of accuracy achieved in the case study would be useful to developers of an embedded system. The case study indicated that this model would continue to be useful over several releases as the system evolves.
嵌入式计算机系统已经成为现代世界的重要组成部分。例如,电信系统是社会信息基础设施的支柱。嵌入式系统必须具有高度可靠的软件。失败的后果可能很严重;停机时间可能无法容忍;而且在偏远地区维修往往很昂贵。此外,当今快速发展的技术市场要求嵌入式系统不断发展,从而导致在多个产品中嵌入多个软件版本。软件质量模型对于嵌入式系统的软件工程来说是有价值的工具,因为一些软件增强技术是如此昂贵或耗时,以至于将它们应用于所有模块是不切实际的。针对这种增强技术是降低现场发现故障可能性的有效途径。研究表明,软件度量是软件故障的有用预测器。软件质量模型是使用过去版本中的度量和故障数据开发的。然后将校准后的模型应用于目前正在开发的模块。这样的模型在逐个模块的基础上产生预测。本文研究了分类与回归树(CART)算法,用于预测哪些软件模块在运行过程中有较高的故障被发现风险。CART很有吸引力,因为它强调修剪以实现鲁棒模型。本文从嵌入式系统软件工程的角度详细介绍了CART算法。我们用嵌入在大型电信系统中的四个连续发布的软件的案例研究来说明这种方法。在案例研究中获得的精确度对嵌入式系统的开发人员非常有用。案例研究表明,随着系统的发展,该模型将在几个版本中继续有用。
{"title":"Predicting fault-prone software modules in embedded systems with classification trees","authors":"T. Khoshgoftaar, E. B. Allen","doi":"10.1109/HASE.1999.809481","DOIUrl":"https://doi.org/10.1109/HASE.1999.809481","url":null,"abstract":"Embedded-computer systems have become essential elements of the modern world. For example, telecommunications systems are the backbone of society's information infrastructure. Embedded systems must have highly reliable software. The consequences of failures may be severe; down-time may not be tolerable; and repairs in remote locations are often expensive. Moreover, today's fast-moving technology marketplace mandates that embedded systems evolve, resulting in multiple software releases embedded in multiple products. Software quality models can be valuable tools for software engineering of embedded systems, because some software-enhancement techniques are so expensive or time-consuming that it is not practical to apply them to all modules. Targeting such enhancement techniques is an effective way to reduce the likelihood of faults discovered in the field. Research has shown software metrics to be useful predictors of software faults. A software quality model is developed using measurements and fault data from a past release. The calibrated model is then applied to modules currently under development. Such models yield predictions on a module-by-module basis. This paper examines the Classification And Regression Trees (CART) algorithm for predicting which software modules have high risk of faults to be discovered during operations. CART is attractive because it emphasizes pruning to achieve robust models. This paper presents details on the CART algorithm in the context of software engineering of embedded systems. We illustrate this approach with a case study of four consecutive releases of software embedded in a large telecommunications system. The level of accuracy achieved in the case study would be useful to developers of an embedded system. The case study indicated that this model would continue to be useful over several releases as the system evolves.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122742822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Building high-assurance systems using COTS components: whether, why, when and how? 使用COTS组件构建高保证系统:是否,为什么,何时以及如何?
R. Paul, A. Tai
The implementation of COTS-based high assurance is becoming a major challenge today when cost concern has led to increased use of COTS products for critical applications. On the other hand, vendors remain reluctant to incorporate fault tolerance features into COTS products because doing so is likely to increase development and production costs and thus weaken the market competitiveness of their products. Therefore, it is crucial for us to cope with the current state of COTS.This panel brings together the researchers and practitioners with expertise, experiences and insights on using COTS components to build high-assurance systems. The purpose of the panel is to foster debating, exchanging and integrating opinions, ideas and solutions from various perspective (e.g., COTS software versus COTS hardware, COTS for long-life deep-space systems versus COTS for highly-available communication applications). We specially solicitate different opinions on the following issues: Whether can we build high-assurance systems using COTS components? Why is it inappropriate or impossible to build high-assurance systems using COTS components? (If the answer to the first question is "No.") Why is it possible to use COTS components that are not designed for critical applications to build high-assurance systems? (If the answer to the first question is "Yes.") When (that is, under which circumstances and conditions) is it appropriate to use COTS components for high-assurance systems? How do we derive solutions to mitigate the problems and inadequacies of COTS products?Among the particular questions we intend to discuss are: 1. What are the evaluation criteria and tradeoff strategies for COTS product selection for high-assurance systems?2. Is it viable to influence the vendors to provide or enhance high-assurance properties for the future versions of their COTS products? What are the strategies?3. Which will be the most practical and effective basis for us to develop methodologies that mitigate the effects of design faults and/or inadequacies of COTS software: fault predication, fault containment, or adaptive fault tolerance4. Is it possible and practical to integrate the methods for mitigating the effects of the design faults/inadequacies of COTS software and hardware in a high-assurance system? And how, if the answer is positive?
当成本问题导致关键应用中越来越多地使用COTS产品时,基于COTS的高保证的实现正在成为当今的主要挑战。另一方面,供应商仍然不愿意将容错特性合并到COTS产品中,因为这样做可能会增加开发和生产成本,从而削弱其产品的市场竞争力。因此,如何应对COTS的现状对我们来说至关重要。该小组将研究人员和实践者聚集在一起,他们具有使用COTS组件构建高保证系统的专业知识、经验和见解。该小组的目的是促进辩论,交流和整合来自不同角度的意见,想法和解决方案(例如,COTS软件与COTS硬件,COTS用于长寿命深空系统与COTS用于高可用性通信应用)。我们特别就以下问题征求不同的意见:我们是否可以使用COTS组件构建高保证系统?为什么使用COTS组件构建高保证系统是不合适或不可能的?(如果第一个问题的答案是“否”)为什么有可能使用不是为关键应用程序设计的COTS组件来构建高保证系统?(如果第一个问题的答案是“是”)什么时候(也就是说,在什么情况和条件下)适合在高保证系统中使用COTS组件?我们如何得出解决方案来减轻COTS产品的问题和不足之处?我们打算讨论的具体问题包括:1。高保证系统的COTS产品选择的评估标准和权衡策略是什么?影响供应商为其COTS产品的未来版本提供或增强高保证特性是否可行?策略是什么?对于我们开发减轻设计错误和/或COTS软件不足的影响的方法来说,哪一个将是最实际和最有效的基础:错误预测,错误遏制,或自适应容错4。在一个高保证系统中,是否有可能和可行的方法来减轻COTS软件和硬件的设计缺陷/不足的影响?如果答案是肯定的呢?
{"title":"Building high-assurance systems using COTS components: whether, why, when and how?","authors":"R. Paul, A. Tai","doi":"10.1109/HASE.1999.809482","DOIUrl":"https://doi.org/10.1109/HASE.1999.809482","url":null,"abstract":"The implementation of COTS-based high assurance is becoming a major challenge today when cost concern has led to increased use of COTS products for critical applications. On the other hand, vendors remain reluctant to incorporate fault tolerance features into COTS products because doing so is likely to increase development and production costs and thus weaken the market competitiveness of their products. Therefore, it is crucial for us to cope with the current state of COTS.This panel brings together the researchers and practitioners with expertise, experiences and insights on using COTS components to build high-assurance systems. The purpose of the panel is to foster debating, exchanging and integrating opinions, ideas and solutions from various perspective (e.g., COTS software versus COTS hardware, COTS for long-life deep-space systems versus COTS for highly-available communication applications). We specially solicitate different opinions on the following issues: Whether can we build high-assurance systems using COTS components? Why is it inappropriate or impossible to build high-assurance systems using COTS components? (If the answer to the first question is \"No.\") Why is it possible to use COTS components that are not designed for critical applications to build high-assurance systems? (If the answer to the first question is \"Yes.\") When (that is, under which circumstances and conditions) is it appropriate to use COTS components for high-assurance systems? How do we derive solutions to mitigate the problems and inadequacies of COTS products?Among the particular questions we intend to discuss are: 1. What are the evaluation criteria and tradeoff strategies for COTS product selection for high-assurance systems?2. Is it viable to influence the vendors to provide or enhance high-assurance properties for the future versions of their COTS products? What are the strategies?3. Which will be the most practical and effective basis for us to develop methodologies that mitigate the effects of design faults and/or inadequacies of COTS software: fault predication, fault containment, or adaptive fault tolerance4. Is it possible and practical to integrate the methods for mitigating the effects of the design faults/inadequacies of COTS software and hardware in a high-assurance system? And how, if the answer is positive?","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HASE in wireless systems 无线系统中的HASE
I. Levendel
Two problems have a significant economic impact on high assurance engineering of systems. The first problem originates from a frequent lack of discipline in the design of dependable systems, which is often exhibited by a weak or non-existent staffing exclusively dedicated to the design and implementation of a cohesive error and failure management strategy. This, in turn, results in excessive field costs for both defect repairs and system maintenance staffing.The second problem is due to the fact that traditional dependable system designs are very expensive in terms of cost of goods, because they rely heavily on proprietary hardware and software. In fact, the implementation of dependability may increase system costs by several orders of magnitude. This is why the usage of COTS appears attractive from a simple-minded viewpoint. For instance, the reality of competition in the more open wireless market has done more for component reuse that any other factor. However, the urgent need for lower cost of goods combined with of the aforementioned first problem (frequent lack of discipline in design for dependability) have led to lower service quality. Conversely, developing a discipline for dependable system design will be a necessary enabler of the use of COTS.In spite of some differences which are explained next, designing dependable systems using COTS requires the same fundamental principles as designing traditional dependable systems. First, errors and malfunctions need to be detected and located. To that effect, reusable components need to be diagnosable, namely their interfaces need to provide information about the eventual occurrence of errors and malfunctions (component observability). In addition, if the functioning of a failing component cannot be corrected, the component must be able to fail in a way that allows its real time replacement by another equivalent component (component controlability). There is also a need to design and implement, in the application software, mechanisms to manage system reconfiguration without notable service interruptions. Although these fundamental design principles are fundamental, COTS designs must emphasize clear component boundary design constraints for dependability, whereas in traditional designs boundaries are not as critical.In summary, component observability and controlability, and well-organized recovery strategies are necessary complementary requirements for the dependable integration of systems using COTS. Undoubtedly, the need to reduce cost while maintaining system dependability will provide a strong incentive for the establishment of a strong design discipline and for the adaptation of COTS for dependable integration.
有两个问题对系统的高保证工程具有重大的经济影响。第一个问题源于在可靠系统的设计中经常缺乏纪律,这通常表现为专门致力于设计和实现内聚错误和失败管理策略的人员编制薄弱或不存在。这反过来又导致缺陷维修和系统维护人员的现场成本过高。第二个问题是由于传统可靠的系统设计在商品成本方面非常昂贵,因为它们严重依赖专有的硬件和软件。事实上,可靠性的实现可能会使系统成本增加几个数量级。这就是为什么从简单的角度来看,COTS的使用看起来很有吸引力。例如,在更加开放的无线市场中,竞争的现实对组件重用的影响比任何其他因素都要大。然而,由于迫切需要降低商品成本,再加上前面提到的第一个问题(可靠性设计经常缺乏纪律),导致服务质量下降。相反,为可靠的系统设计开发规程将是使用COTS的必要推动者。尽管存在一些差异,但使用COTS设计可靠系统需要与设计传统可靠系统相同的基本原则。首先,需要检测和定位错误和故障。为此,可重用组件需要是可诊断的,也就是说,它们的接口需要提供有关错误和故障最终发生的信息(组件可观察性)。此外,如果失败组件的功能无法纠正,则该组件必须能够以允许其被另一个等效组件实时替换的方式发生故障(组件可控性)。还需要在应用软件中设计和实现管理系统重新配置的机制,而不会出现明显的服务中断。虽然这些基本设计原则是基本的,但是COTS设计必须强调明确的组件边界设计约束,以保证可靠性,而在传统设计中,边界并不是那么重要。总之,组件的可观察性和可控性以及组织良好的恢复策略是使用COTS进行系统可靠集成的必要补充要求。毫无疑问,在保持系统可靠性的同时降低成本的需求将为建立强大的设计规程和适应COTS以实现可靠集成提供强烈的激励。
{"title":"HASE in wireless systems","authors":"I. Levendel","doi":"10.1109/HASE.1999.809484","DOIUrl":"https://doi.org/10.1109/HASE.1999.809484","url":null,"abstract":"Two problems have a significant economic impact on high assurance engineering of systems. The first problem originates from a frequent lack of discipline in the design of dependable systems, which is often exhibited by a weak or non-existent staffing exclusively dedicated to the design and implementation of a cohesive error and failure management strategy. This, in turn, results in excessive field costs for both defect repairs and system maintenance staffing.The second problem is due to the fact that traditional dependable system designs are very expensive in terms of cost of goods, because they rely heavily on proprietary hardware and software. In fact, the implementation of dependability may increase system costs by several orders of magnitude. This is why the usage of COTS appears attractive from a simple-minded viewpoint. For instance, the reality of competition in the more open wireless market has done more for component reuse that any other factor. However, the urgent need for lower cost of goods combined with of the aforementioned first problem (frequent lack of discipline in design for dependability) have led to lower service quality. Conversely, developing a discipline for dependable system design will be a necessary enabler of the use of COTS.In spite of some differences which are explained next, designing dependable systems using COTS requires the same fundamental principles as designing traditional dependable systems. First, errors and malfunctions need to be detected and located. To that effect, reusable components need to be diagnosable, namely their interfaces need to provide information about the eventual occurrence of errors and malfunctions (component observability). In addition, if the functioning of a failing component cannot be corrected, the component must be able to fail in a way that allows its real time replacement by another equivalent component (component controlability). There is also a need to design and implement, in the application software, mechanisms to manage system reconfiguration without notable service interruptions. Although these fundamental design principles are fundamental, COTS designs must emphasize clear component boundary design constraints for dependability, whereas in traditional designs boundaries are not as critical.In summary, component observability and controlability, and well-organized recovery strategies are necessary complementary requirements for the dependable integration of systems using COTS. Undoubtedly, the need to reduce cost while maintaining system dependability will provide a strong incentive for the establishment of a strong design discipline and for the adaptation of COTS for dependable integration.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122771709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Amaranth framework: Probabilistic, utility-based quality of service management for high-assurance computing Amaranth框架:用于高保证计算的概率性、基于实用程序的服务质量管理
C. Hoover, Jeffery P. Hansen, P. Koopman, S. Tamboli
System resource management for high-assurance applications such as the command and control of a battle group is a complex problem. These applications often require guaranteed computing services that must satisfy both hard and soft deadlines. In addition, their resource demands can vary significantly over time with bursts of high activity amidst periods of inactivity. A traditional solution has been to dedicate resources to critical application tasks and to share resources among noncritical tasks. With the increasing complexity of high-assurance applications and the need to reduce system costs, dedicating resources is not a satisfactory solution. The Amaranth Project at Carnegie Mellon is researching and developing a framework for allocating shared resources to support multiple quality of service (QoS) dimensions and to provide probabilistic assurances of service. This paper is an overview of the Amaranth framework, the current results from applying the framework, and the future research directions for the Amaranth project.
系统资源管理是高保证应用的一个复杂问题,如战斗群的指挥和控制。这些应用程序通常需要有保证的计算服务,这些服务必须同时满足硬期限和软期限。此外,随着时间的推移,它们的资源需求可能会有很大的变化,在不活动的时期会出现高活动的爆发。传统的解决方案是将资源专用于关键应用程序任务,并在非关键任务之间共享资源。随着高保证应用程序的复杂性的增加和降低系统成本的需要,专用资源并不是一个令人满意的解决方案。卡内基梅隆大学的Amaranth项目正在研究和开发一个框架,用于分配共享资源,以支持多个服务质量(QoS)维度,并提供服务的概率保证。本文综述了紫红花研究框架、应用该框架的最新成果以及紫红花项目未来的研究方向。
{"title":"The Amaranth framework: Probabilistic, utility-based quality of service management for high-assurance computing","authors":"C. Hoover, Jeffery P. Hansen, P. Koopman, S. Tamboli","doi":"10.1109/HASE.1999.809496","DOIUrl":"https://doi.org/10.1109/HASE.1999.809496","url":null,"abstract":"System resource management for high-assurance applications such as the command and control of a battle group is a complex problem. These applications often require guaranteed computing services that must satisfy both hard and soft deadlines. In addition, their resource demands can vary significantly over time with bursts of high activity amidst periods of inactivity. A traditional solution has been to dedicate resources to critical application tasks and to share resources among noncritical tasks. With the increasing complexity of high-assurance applications and the need to reduce system costs, dedicating resources is not a satisfactory solution. The Amaranth Project at Carnegie Mellon is researching and developing a framework for allocating shared resources to support multiple quality of service (QoS) dimensions and to provide probabilistic assurances of service. This paper is an overview of the Amaranth framework, the current results from applying the framework, and the future research directions for the Amaranth project.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1