Stop the war!
Остановите войну!
for scientists:
default search action
HASE 2004: Tampa, FL, USA
- 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 25-26 March 2004, Tampa, FL, USA. IEEE Computer Society 2004, ISBN 0-7695-2094-4
Design Assurance
- Dongfeng Wang, Hui Ma, Farokh B. Bastani, I-Ling Yen:
Decomposition of Fairness and Performance Aspects for High-Assurance Continuous Process-Control Systems. 3-11 - Josh Dehlinger, Robyn R. Lutz:
Software Fault Tree Analysis for Product Lines. 12-21 - Iain Bate, Neil C. Audsley:
Flexible Design of Complex High-Integrity Systems Using Trade Offs. 22-31 - Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Shin:
Multi-View Modeling and Analysis of Embedded Real-Time Software with Meta-Modeling and Model Transformation. 32-41
Knowledge Based System Assurance Techniques
- Suraj C. Kothari, Luke Bishop, Jeremias Sauceda, Gary Daugherty:
Knowledge-Centric and Language Independent Framework for Safety Analysis Tools. 45-55 - Yi Liu, Taghi M. Khoshgoftaar:
Reducing Overfitting in Genetic Programming Models for Software Quality Classification. 56-65
Fault Tolerant System Design and Analysis
- Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems. 69-78 - Ivan Luque, Xiaodong Lu, Misato Tasaka, Kinji Mori, Yasushi Kuba:
Decentralized Workload Management for Assurance According to Heterogeneous Service Levels. 79-88 - Stefan Gossens, Mario Dal Cin:
Structural Analysis of Explicit Fault-Tolerant Programs. 89-96
System Level Test Methodologies
- Mark Sh. Levin, Mark Last:
Multi-Function System Testing: Composition of Test Sets. 99-108 - Praveen Ikkurthy, John Shahbazian, Miguel A. Labrador, Kenneth J. Christensen:
Testing Large Scale Streaming Internet Applications over Wireless LANs. 109-115 - Rosina Weber, Duanqing Wu:
Knowledge Management for Computational Intelligence Systems. 116-125
Quantitative and Model Based Approaches
- Tim Menzies, Justin S. Di Stefano:
How Good Is Your Blind Spot Sampling Policy? 129-138 - Norman F. Schneidewind:
Assessing Reliability Risk Using Fault Correction Profiles. 139-148 - Shi Zhong, Taghi M. Khoshgoftaar, Naeem Seliya:
Unsupervised Learning for Expert-Based Software Quality Estimation. 149-155 - Tetsuya Masuishi, Kinji Mori:
A Method for Solving Trade-Off among Cost for Owned/Borrowed Resource and Loss of Business Chances. 156-164
Formal Approaches to System Verification
- Gregory L. Wickstrom, Jared Davis, Steven E. Morrison, Steve Roach, Victor L. Winter:
The SSP: An Example of High-Assurance Systems Engineering. 167-177 - Mats Per Erik Heimdahl, George Devaraj, Robert Weber:
Specification Test Coverage Adequacy Criteria = Specification Test Generation Inadequacy Criteria? 178-186 - Anneliese Amschler Andrews, Andrew O'Fallon, Tom Chen:
RUBASTEM: A Method for Testing VHDL Behavioral Models. 187-196 - Chia-Chu Chiang:
A Formal Specification-Based Approach to Distributed Parallel Programming. 197-205
Reliability Modeling for Dependable Systems
- Katerina Goseva-Popstojanova, Sunil Kamavaram:
Software Reliability Estimation under Uncertainty: Generalization of the Method of Moments. 209-218 - Hiroyuki Okamura, Atsushi Murayama, Tadashi Dohi:
EM Algorithm for Discrete Software Reliability Models: A Unified Parameter Estimation Method. 219-228
Design and Assessment of Secure Systems
- Jan Jürjens:
Developing High-Assurance Secure Systems with UML: A Smartcard-Based Purchase Protocol. 231-240 - Qingkai Ma, Wei Hao, I-Ling Yen, Farokh B. Bastani:
Multiparty Computation with Full Computation Power and Reduced Overhead. 241-248 - Taghi M. Khoshgoftaar, Mohamed E. Abushadi:
Resource-Sensitive Intrusion Detection Models for Network Traffic. 249-258
NISTP Abstracts
- Donald J. Berndt, Alison Watkins:
Investigating the Performance of Genetic Algorithm-Based Software Test Case Generation. 261-262 - Mark Last, Menahem Friedman:
Automated Detection of Injected Faults in a Differential Equation Solver. 263-264 - Richard C. Linger, Alan R. Hevner, Gwendolyn H. Walton, Mark G. Pleszkoch:
Automated Detection of Injected Faults in a Differential Equation Solver Network Systems Development. 265-266 - Richard C. Linger, Mark G. Pleszkoch:
Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems. 267-268 - Thomas Barr:
Architectural Overview of the Computational Intelligence Testing Tool: CI-Tool. 269-270
Session 2FA
- Andrew J. Kornecki, Kimberley Hall, Darryl Hearn, Herman Lau, Janusz Zalewski:
Evaluation of Software Development Tools for High Assurance Safety Critical Systems. 273-274 - Xiaodong Lu, Yi Zhou, Misato Tasaka, Ivan Luque, Kinji Mori, Ryuji Takanuki:
Autonomous Rating Oriented Agent Allocation to Achieve High Response in Demand-Oriented Information Service System. 275-276 - Pramod Gupta, Johann Schumann:
A Tool for Verification and Validation of Neural Network Based Adaptive Controllers for High Assurance Systems. 277-278 - Dejan Desovski:
Combining Testing and Model Checking for Verification of High Assurance Systems. 279-280 - Laura Pullum, Marjorie Darrah, Spiro T. Skias, Kam S. Tso, Ann T. Tai:
Developing a Data Driven Prognostic System with Limited System Information. 281-282 - Seo Ryong Koo, Poong-Hyun Seong, Sung Deok Cha:
Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC). 283-284 - Myung Jun Song, Seo Ryong Koo, Poong-Hyun Seong:
Development of a Verification Method for Timed Function Blocks Using ESDT and SMV. 285-286 - Lazar Crawford, Jared Erwin, Steafano Grimaldi, Soma Mitra, Andrew J. Kornecki, David P. Gluch:
A Study of Automatic Code Generation for Safety-Critical Software: Preliminary Report. 287-288 - Huiqun Yu, Xudong He, Yi Deng, Lian Mo:
A Formal Approach to Designing Secure Software Architectures. 289-290
Session 3FA
- Frederick T. Sheldon, Thomas E. Potok, Andy Loebl, Axel W. Krings, Paul W. Oman:
Managing Secure Survivable Critical Infrastructures to Avoid Vulnerabilities. 293-296 - Ewen Denney, Bernd Fischer, Johann Schumann:
Adding Assurance to Automatically Generated Code. 297-299 - Tom Keeley:
KEEL Technology Applied to Highly Distributed Loosely Coupled Systems. 300-301 - Jia Zhou, Kendra M. L. Cooper, I-Ling Yen:
A Rule-Based Component Customization Technique for QoS Properties. 302-303 - Hideki Nomoto:
State Oriented Programming. 304-305 - Jing Dong, Sheng Yang:
Towards Trusted Composition in Software Design. 306-307 - Wei Yu:
Analyze the Worm-Based Attack in Large Scale P2P. 308-309 - Yiannis Papadopoulos, David Parker, Christian Grante:
Automating the Failure Modes and Effects Analysis of Safety Critical Systems. 310-311 - Mansour H. Assaf, Sunil R. Das, Emil M. Petriu, Mehmet Sahinoglu:
Enhancing Testability in Architectural Design for the New Generation of Core-Based Embedded Systems. 312-313
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.