首页 > 最新文献

13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)最新文献

英文 中文
SET: interactive tool for learning and training scan-based DFT principles and their consequences to parameters of embedded system SET:用于学习和训练基于扫描的DFT原理及其对嵌入式系统参数的影响的交互式工具
Josef Strnadel, Z. Kotásek
In the paper, upgraded version of our tool for learning and training of scan design for testability technique principles and its consequences to parameters of embedded system is presented. It is outlined how the tool can be utilized in education process in order to illustrate relation between design and diagnostic parameters of embedded system
本文介绍了扫描设计学习与训练工具的升级版,介绍了可测性技术原理及其对嵌入式系统参数的影响。为了说明嵌入式系统的设计参数与诊断参数之间的关系,概述了该工具在教育过程中的应用
{"title":"SET: interactive tool for learning and training scan-based DFT principles and their consequences to parameters of embedded system","authors":"Josef Strnadel, Z. Kotásek","doi":"10.1109/ECBS.2006.65","DOIUrl":"https://doi.org/10.1109/ECBS.2006.65","url":null,"abstract":"In the paper, upgraded version of our tool for learning and training of scan design for testability technique principles and its consequences to parameters of embedded system is presented. It is outlined how the tool can be utilized in education process in order to illustrate relation between design and diagnostic parameters of embedded system","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing 用于混合多跳路由的自动配置、自适应、度量驱动的簇头组织
Nikos Migas, W. Buchanan
Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provides an effective way to reduce network overhead, in contrast to traditional flooding methods. This novel method creates a network backbone for data routing and location management, which is composed of the fittest nodes. The key metrics are: mobility, buffering capabilities, throughput, network state, utilisation, and battery reserves. The paper presents the overall agent-based model, and describes the adaptability of the cluster-head metrics, and the automated reconfigurability of an ad-hoc network
多跳自组织路由是一个具有挑战性的问题,因为网络拓扑是动态的,而且资源受限的移动设备的能力有限。本文提出了一种度量驱动的参与节点聚类组织,与传统的泛洪方法相比,它提供了一种有效的方法来减少网络开销。该方法为数据路由和位置管理创建了一个由最合适的节点组成的网络骨干网。关键指标是:移动性、缓冲能力、吞吐量、网络状态、利用率和电池储量。本文提出了基于智能体的整体模型,并描述了簇头指标的适应性和自组织网络的自动可重构性
{"title":"An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing","authors":"Nikos Migas, W. Buchanan","doi":"10.1109/ECBS.2006.23","DOIUrl":"https://doi.org/10.1109/ECBS.2006.23","url":null,"abstract":"Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provides an effective way to reduce network overhead, in contrast to traditional flooding methods. This novel method creates a network backbone for data routing and location management, which is composed of the fittest nodes. The key metrics are: mobility, buffering capabilities, throughput, network state, utilisation, and battery reserves. The paper presents the overall agent-based model, and describes the adaptability of the cluster-head metrics, and the automated reconfigurability of an ad-hoc network","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive tracking in distributed wireless sensor networks 分布式无线传感器网络中的自适应跟踪
Lizhi Yang, Chuan Feng, J. Rozenblit, Haiyan Qiao
We study the problem of tracking moving objects using distributed wireless sensor networks (WSNs) in which sensors are deployed randomly. Due to the uncertainty and unpredictability of real-world objects' motion, the tracking algorithm is needed to adapt to real-time changes of velocities and directions of a moving target. Moreover, the energy consumption of the tracking algorithm has to be considered because of the inherent limitations of wireless sensors. In this paper, we proposed an energy efficient tracking algorithm, called Predict-and-Mesh (PaM) that is well suited for pervasively monitoring various kinds of objects with random movement patterns. PaM is a distributed algorithm consisting of two prediction models: n-step prediction and collaborative prediction, and a predication failure recovery process called mesh. The simulation results show that the PaM algorithm is robust against diverse motion changes and has the excellent performance
本文研究了随机部署传感器的分布式无线传感器网络(WSNs)的运动目标跟踪问题。由于现实世界中物体运动的不确定性和不可预测性,需要跟踪算法适应运动目标的速度和方向的实时变化。此外,由于无线传感器固有的局限性,必须考虑跟踪算法的能量消耗。在本文中,我们提出了一种节能的跟踪算法,称为预测和网格(PaM),它非常适合于广泛监控各种具有随机运动模式的物体。PaM是一种分布式算法,由两种预测模型组成:n步预测和协同预测,以及一种称为mesh的预测故障恢复过程。仿真结果表明,该算法对各种运动变化具有较强的鲁棒性,具有较好的性能
{"title":"Adaptive tracking in distributed wireless sensor networks","authors":"Lizhi Yang, Chuan Feng, J. Rozenblit, Haiyan Qiao","doi":"10.1109/ECBS.2006.20","DOIUrl":"https://doi.org/10.1109/ECBS.2006.20","url":null,"abstract":"We study the problem of tracking moving objects using distributed wireless sensor networks (WSNs) in which sensors are deployed randomly. Due to the uncertainty and unpredictability of real-world objects' motion, the tracking algorithm is needed to adapt to real-time changes of velocities and directions of a moving target. Moreover, the energy consumption of the tracking algorithm has to be considered because of the inherent limitations of wireless sensors. In this paper, we proposed an energy efficient tracking algorithm, called Predict-and-Mesh (PaM) that is well suited for pervasively monitoring various kinds of objects with random movement patterns. PaM is a distributed algorithm consisting of two prediction models: n-step prediction and collaborative prediction, and a predication failure recovery process called mesh. The simulation results show that the PaM algorithm is robust against diverse motion changes and has the excellent performance","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Guided architecture-based design optimisation of CBSs 指导基于架构的CBSs设计优化
David Livolsi, T. O'Neill, J. Leaney, M. Denford, K. Dunsire
Computer-based systems (CBS) are becoming increasingly pervasive throughout society, continually increasing in complexity and cost as they are called upon to fulfil more and more complicated tasks. Unfortunately, multi-million dollar projects often fail because the systems are unreliable, inefficient, insecure and unmaintainable. The National Australia Bank's $409M software writedown and the failure of the $250M Australian Customs Service Integrated Cargo System are but two recent Australian examples. Clearly, systems must be built with a range of qualities such as reliability, performance and security, in addition to their required functionality, if they are to be successful. In other fields of engineering, such as aerospace and aeronautical engineering, where similar challenges of multiple conflicting requirements are faced, the approach of design optimisation has been found to be successful. This experience indicates that a similar approach of design optimisation also help to meet the challenges presented by the quality requirements of CBSs. This paper advances our work on design optimisation with an exploratory optimisation method that derives an architecture that best satisfies the system's quality requirements. The method allows a designer to explore possible architectures by repeatedly applying evolutions to an initial architecture, with the quality attributes of each architecture being collected throughout and providing feedback that guides the designer to the final optimal architecture. A prototype tool is also presented that implements this architecture-based optimisation method, using Avolution's industry-proven ABACUStrade toolset
基于计算机的系统(CBS)在整个社会中变得越来越普遍,随着它们被要求完成越来越复杂的任务,其复杂性和成本不断增加。不幸的是,数百万美元的项目经常失败,因为系统不可靠、效率低下、不安全和不可维护。澳大利亚国民银行(National Australia Bank) 4.09亿美元的软件减记和2.5亿美元的澳大利亚海关综合货物系统(Australian Customs Service Integrated Cargo System)的失败,不过是澳大利亚最近的两个例子。显然,系统要想成功,除了必需的功能之外,还必须具备诸如可靠性、性能和安全性等一系列质量。在其他工程领域,如航空航天和航空工程,面临着多种相互冲突的需求的类似挑战,设计优化的方法已经被发现是成功的。这一经验表明,类似的设计优化方法也有助于满足CBSs质量要求所带来的挑战。本文提出了一种探索性优化方法,该方法派生出最能满足系统质量要求的体系结构,从而推进了我们在设计优化方面的工作。该方法允许设计人员通过对初始体系结构重复应用演进来探索可能的体系结构,同时收集每个体系结构的质量属性,并提供反馈,指导设计人员获得最终的最佳体系结构。本文还介绍了一种原型工具,该工具使用evolution的业界验证的ABACUStrade工具集,实现了这种基于体系结构的优化方法
{"title":"Guided architecture-based design optimisation of CBSs","authors":"David Livolsi, T. O'Neill, J. Leaney, M. Denford, K. Dunsire","doi":"10.1109/ECBS.2006.44","DOIUrl":"https://doi.org/10.1109/ECBS.2006.44","url":null,"abstract":"Computer-based systems (CBS) are becoming increasingly pervasive throughout society, continually increasing in complexity and cost as they are called upon to fulfil more and more complicated tasks. Unfortunately, multi-million dollar projects often fail because the systems are unreliable, inefficient, insecure and unmaintainable. The National Australia Bank's $409M software writedown and the failure of the $250M Australian Customs Service Integrated Cargo System are but two recent Australian examples. Clearly, systems must be built with a range of qualities such as reliability, performance and security, in addition to their required functionality, if they are to be successful. In other fields of engineering, such as aerospace and aeronautical engineering, where similar challenges of multiple conflicting requirements are faced, the approach of design optimisation has been found to be successful. This experience indicates that a similar approach of design optimisation also help to meet the challenges presented by the quality requirements of CBSs. This paper advances our work on design optimisation with an exploratory optimisation method that derives an architecture that best satisfies the system's quality requirements. The method allows a designer to explore possible architectures by repeatedly applying evolutions to an initial architecture, with the quality attributes of each architecture being collected throughout and providing feedback that guides the designer to the final optimal architecture. A prototype tool is also presented that implements this architecture-based optimisation method, using Avolution's industry-proven ABACUStrade toolset","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130709540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UMLintr: a UML profile for specifying intrusions UMLintr:用于指定入侵的UML概要文件
Mohammed Hussein, Mohammad Zulkernine
Specifications of non-functional requirements (NFR) such as security, safety, usability are as important as specification of functional requirements (FR). Non conformance to some NFR may render the whole software useless. There are many difficulties associated with the representation of NFR and the complexity of their subsequent validation. The main objective of this work is towards incorporating an important aspect of NFR, i.e., security from the very beginning of a software development process. In this paper, a framework is presented for specifying intrusion scenarios in the Unified Modeling Language (UML). We describe a UML profile called UMLintr (UML for intrusion specifications) that allows developers to specify intrusions using UML notations extended to suit the context of intrusion scenarios. The framework utilizes the expressiveness of UML and eliminates the need of using attack languages that are proposed only to describe attack scenarios. Since developers do not need to learn a separate language to describe attacks, the task of specifying intrusion scenarios becomes much easier. This approach also helps to avoid conflicting (e.g., security vs. usability), ambiguous, and redundant requirements. Examples are provided to show the usage of the proposed UML profile
非功能需求规范(NFR),如安全性、安全性、可用性,与功能需求规范(FR)同样重要。不符合某些NFR可能会使整个软件无用。NFR的表示及其后续验证的复杂性存在许多困难。这项工作的主要目标是整合NFR的一个重要方面,即,从软件开发过程的最开始的安全性。本文提出了一个用统一建模语言(UML)描述入侵场景的框架。我们描述了一个名为UMLintr(用于入侵规范的UML)的UML概要文件,它允许开发人员使用扩展到适合入侵场景上下文的UML符号来指定入侵。该框架利用了UML的表达性,并消除了使用仅用于描述攻击场景的攻击语言的需要。由于开发人员不需要学习单独的语言来描述攻击,因此指定入侵场景的任务变得容易得多。这种方法还有助于避免冲突(例如,安全性与可用性)、模糊和冗余的需求。提供了一些示例来显示所建议的UML概要文件的用法
{"title":"UMLintr: a UML profile for specifying intrusions","authors":"Mohammed Hussein, Mohammad Zulkernine","doi":"10.1109/ECBS.2006.70","DOIUrl":"https://doi.org/10.1109/ECBS.2006.70","url":null,"abstract":"Specifications of non-functional requirements (NFR) such as security, safety, usability are as important as specification of functional requirements (FR). Non conformance to some NFR may render the whole software useless. There are many difficulties associated with the representation of NFR and the complexity of their subsequent validation. The main objective of this work is towards incorporating an important aspect of NFR, i.e., security from the very beginning of a software development process. In this paper, a framework is presented for specifying intrusion scenarios in the Unified Modeling Language (UML). We describe a UML profile called UMLintr (UML for intrusion specifications) that allows developers to specify intrusions using UML notations extended to suit the context of intrusion scenarios. The framework utilizes the expressiveness of UML and eliminates the need of using attack languages that are proposed only to describe attack scenarios. Since developers do not need to learn a separate language to describe attacks, the task of specifying intrusion scenarios becomes much easier. This approach also helps to avoid conflicting (e.g., security vs. usability), ambiguous, and redundant requirements. Examples are provided to show the usage of the proposed UML profile","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128891996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
An enhanced model for agent based requirement gathering and pre-system analysis 基于agent的需求收集和预系统分析的增强模型
P. Ranjan, A. Misra
Agent oriented software development is generally motivated by the need of open and adaptive systems development that continuously change and evolve to meet new requirements. In this paper, we propose an agent-based open and adaptive system development process. The proposed methodology is based on model-based techniques and provides a specific model for the type of information to be gathered and uses this model to drive the user-oriented requirement analysis, specification and system-oriented analysis process. The proposed methodology also reduces the complexity of the software system and provides better quality with better user-satisfaction. The Gaia and ROADMAP models have been used as a fundamental ingredient to the new proposed agent-based modeling method. In the proposed agent-based system, the focus is on a clear separation between the requirement gathering and analysis phases. The scope of the discussion covers requirements gathering and user-oriented analysis phases only and does not touch upon the system analysis and design phases
面向代理的软件开发通常是由开放和自适应系统开发的需求驱动的,这些系统开发需要不断变化和发展以满足新的需求。本文提出了一种基于智能体的开放自适应系统开发流程。该方法基于基于模型的技术,为需要收集的信息类型提供了一个特定的模型,并使用该模型来驱动面向用户的需求分析、规范和面向系统的分析过程。所提出的方法还降低了软件系统的复杂性,提供了更好的质量和更好的用户满意度。Gaia和ROADMAP模型被用作新提出的基于智能体的建模方法的基本组成部分。在建议的基于代理的系统中,重点是需求收集和分析阶段之间的明确分离。讨论的范围只涵盖需求收集和面向用户的分析阶段,而不涉及系统分析和设计阶段
{"title":"An enhanced model for agent based requirement gathering and pre-system analysis","authors":"P. Ranjan, A. Misra","doi":"10.1109/ECBS.2006.24","DOIUrl":"https://doi.org/10.1109/ECBS.2006.24","url":null,"abstract":"Agent oriented software development is generally motivated by the need of open and adaptive systems development that continuously change and evolve to meet new requirements. In this paper, we propose an agent-based open and adaptive system development process. The proposed methodology is based on model-based techniques and provides a specific model for the type of information to be gathered and uses this model to drive the user-oriented requirement analysis, specification and system-oriented analysis process. The proposed methodology also reduces the complexity of the software system and provides better quality with better user-satisfaction. The Gaia and ROADMAP models have been used as a fundamental ingredient to the new proposed agent-based modeling method. In the proposed agent-based system, the focus is on a clear separation between the requirement gathering and analysis phases. The scope of the discussion covers requirements gathering and user-oriented analysis phases only and does not touch upon the system analysis and design phases","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modeling and analysis of functionality in eHome systems: dynamic rule-based conflict detection eHome系统中功能的建模和分析:基于规则的动态冲突检测
Ibrahim Armaç, M. Kirchhof, Liviana Manolescu
The domain of eHome systems is a special application-area for pervasive computing. Many different kinds of devices are introduced to the home area to provide functionality for enhanced comfort or security. A similar level of heterogeneity can be found at the software level: many different vendors supply eHome systems with drivers and services, which intend to compute sensor information and trigger devices in the eHome. This multi-level heterogeneity leads to system faults in terms of deadlocks and unpredictable or disillusioning behavior. We call these error conditions conflicts. Pervasive systems, especially eHome systems, is only useful and thus successful, if such conflicts can be handled properly. In this paper, we analyze eHome systems with respect to types of conflicts and discuss how conflicts can be detected. We show that the dynamic conflict detection is reasonable and possible by a rule-based conflict detection. The detection is well-founded on a formal specification and is seamlessly integrated into the paradigm of component-based software construction
eHome系统领域是普适计算的一个特殊应用领域。许多不同种类的设备被引入到家庭区域,以提供增强舒适性或安全性的功能。在软件层面也可以发现类似的异质性:许多不同的供应商为eHome系统提供驱动程序和服务,这些驱动程序和服务旨在计算eHome中的传感器信息和触发设备。这种多层次的异构性会导致死锁和不可预测或令人失望的行为方面的系统故障。我们称这些错误条件为冲突。普适系统,特别是eHome系统,只有在能够正确处理这些冲突的情况下才有用,因此才会成功。在本文中,我们分析了eHome系统的冲突类型,并讨论了如何检测冲突。通过基于规则的冲突检测,证明了动态冲突检测的合理性和可行性。检测很好地建立在正式的规范之上,并且无缝地集成到基于组件的软件构造范例中
{"title":"Modeling and analysis of functionality in eHome systems: dynamic rule-based conflict detection","authors":"Ibrahim Armaç, M. Kirchhof, Liviana Manolescu","doi":"10.1109/ECBS.2006.48","DOIUrl":"https://doi.org/10.1109/ECBS.2006.48","url":null,"abstract":"The domain of eHome systems is a special application-area for pervasive computing. Many different kinds of devices are introduced to the home area to provide functionality for enhanced comfort or security. A similar level of heterogeneity can be found at the software level: many different vendors supply eHome systems with drivers and services, which intend to compute sensor information and trigger devices in the eHome. This multi-level heterogeneity leads to system faults in terms of deadlocks and unpredictable or disillusioning behavior. We call these error conditions conflicts. Pervasive systems, especially eHome systems, is only useful and thus successful, if such conflicts can be handled properly. In this paper, we analyze eHome systems with respect to types of conflicts and discuss how conflicts can be detected. We show that the dynamic conflict detection is reasonable and possible by a rule-based conflict detection. The detection is well-founded on a formal specification and is seamlessly integrated into the paradigm of component-based software construction","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"21 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132496713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Evaluating cognitive information complexity measure 评估认知信息复杂性测量
D. S. Kushwaha, A. Misra
In this paper, an attempt has been made to evaluate cognitive information complexity measure (CICM) terms of nine Weyuker properties. It has been found that all the nine properties have been satisfied by CICM and hence establishes cognitive information complexity measure based on information contained in the software as a robust and well-structured one
本文对认知信息复杂性测度(CICM)的九个Weyuker属性进行了评价。研究发现,CICM满足了所有九个属性,从而建立了基于软件中包含的信息的认知信息复杂性度量,这是一个鲁棒性和结构良好的度量
{"title":"Evaluating cognitive information complexity measure","authors":"D. S. Kushwaha, A. Misra","doi":"10.1109/ECBS.2006.41","DOIUrl":"https://doi.org/10.1109/ECBS.2006.41","url":null,"abstract":"In this paper, an attempt has been made to evaluate cognitive information complexity measure (CICM) terms of nine Weyuker properties. It has been found that all the nine properties have been satisfied by CICM and hence establishes cognitive information complexity measure based on information contained in the software as a robust and well-structured one","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Requirements engineering for the adviser portal bank system 顾问门户银行系统的需求工程
Jens Bæk Jørgensen, Kristian Bisgaard Lassen
The adviser portal (AP) is a new IT system for 15 Danish banks. The main goal of AP is to increase the efficiency and quality of bank advisers' work. Requirements engineering for AP includes describing new work processes that must be supported by AP using a combination of: (1) prose and informal drawings; (2) formal models; and (3) graphical animation. This representation helps users and systems analysts to align new work processes and AP via early experiments in a prototyping fashion. The contribution of this paper is to present and reflect upon the analysis and description of one specific, important work process
顾问门户(AP)是丹麦15家银行的新IT系统。AP的主要目标是提高银行顾问的工作效率和质量。AP的需求工程包括描述AP必须支持的新工作过程,使用以下组合:(1)散文和非正式图纸;(2)形式模型;(3)图形化动画。这种表示方式可以帮助用户和系统分析人员通过原型设计方式的早期实验来调整新的工作过程和AP。本文的贡献是对一个具体的、重要的工作过程的分析和描述进行展示和反思
{"title":"Requirements engineering for the adviser portal bank system","authors":"Jens Bæk Jørgensen, Kristian Bisgaard Lassen","doi":"10.1109/ECBS.2006.60","DOIUrl":"https://doi.org/10.1109/ECBS.2006.60","url":null,"abstract":"The adviser portal (AP) is a new IT system for 15 Danish banks. The main goal of AP is to increase the efficiency and quality of bank advisers' work. Requirements engineering for AP includes describing new work processes that must be supported by AP using a combination of: (1) prose and informal drawings; (2) formal models; and (3) graphical animation. This representation helps users and systems analysts to align new work processes and AP via early experiments in a prototyping fashion. The contribution of this paper is to present and reflect upon the analysis and description of one specific, important work process","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114298680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid intrusion detection and visualization system 一种混合入侵检测和可视化系统
Jianfeng Peng, Chuan Feng, J. Rozenblit
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks
网络攻击已经成为当今大部分相互连接的计算机系统的根本威胁。未经授权的活动和未经授权的访问占这些网络的很大比例。未经授权的访问和滥用关键数据可能对企业、应急服务造成灾难性影响,甚至威胁到一个国家的国防和安全。面对日益增多的安全漏洞,入侵检测系统是防御系统不可缺少的手段。本文利用当前基于特征和异常检测方法的优点,提出了一种混合入侵检测和可视化系统。混合指令检测系统以两阶段的方式部署这两种方法来识别已知和新的攻击。当检测到入侵时,驻留在系统上的自治代理自动采取措施防止计算机系统的误用和滥用,从而保护系统免受内部和外部攻击
{"title":"A hybrid intrusion detection and visualization system","authors":"Jianfeng Peng, Chuan Feng, J. Rozenblit","doi":"10.1109/ECBS.2006.8","DOIUrl":"https://doi.org/10.1109/ECBS.2006.8","url":null,"abstract":"Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a hybrid intrusion detection and visualization system that leverages the advantages of current signature-based and anomaly detection methods. The hybrid instruction detection system deploys these two methods in a two-staged manner to identify both known and novel attacks. When intrusion is detected, autonomous agents that reside on the system automatically take actions against misuse and abuse of computer system, thus protecting the system from internal and external attacks","PeriodicalId":430872,"journal":{"name":"13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125694616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1