Default Cover Image

Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering

Nov. 17 1999 to Nov. 19 1999

Washington, D.C.

ISSN: 1530-2059

ISBN: 0-7695-0418-3

Table of Contents

Message from the General ChairFreely available from IEEE.pp. ix
Organizing CommitteeFreely available from IEEE.pp. xii
Program Committee and ReviewersFreely available from IEEE.pp. xiii
Keynote I
Convergence on High Assurability: Will We Converge or Diverge?Full-text access may be available. Sign in or learn about subscription options.
Keynote II
Countdown to Y2K: View from the DoD DCIOFull-text access may be available. Sign in or learn about subscription options.
Paper Session I: Evaluation and Testing
DynaMICs: An Automated and Independent Software-Fault Detection ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 11
Paper Session I: Evaluation and Testing
Using Modechart Modules for Testing Formal SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 20
Paper Session I: Evaluation and Testing
Assurance-Based Y2K TestingFull-text access may be available. Sign in or learn about subscription options.pp. 27
Paper Session II: Special Session on UML for High Assurance Systems
Quantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 37
Paper Session II: Special Session on UML for High Assurance Systems
Model Checking UML Statechart Diagrams Using JACKFull-text access may be available. Sign in or learn about subscription options.pp. 46
Paper Session II: Special Session on UML for High Assurance Systems
UML-Based Analysis of Embedded Systems Using a Mapping to VHDLFull-text access may be available. Sign in or learn about subscription options.pp. 56
Paper Session II: Special Session on UML for High Assurance Systems
Automatic Dependability Analysis for Supporting Design Decisions in UMLFull-text access may be available. Sign in or learn about subscription options.pp. 64
Paper Session III: Experience Reports
The Corot Instrument's Software: Towards Intrinsically Reconfigurable Real-Time Embedded Processing Software in Space-Born InstrumentsFull-text access may be available. Sign in or learn about subscription options.pp. 75
Paper Session III: Experience Reports
Applying Formal Methods to an Information Security Device: An Experience ReportFull-text access may be available. Sign in or learn about subscription options.pp. 81
Paper Session III: Experience Reports
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2)Full-text access may be available. Sign in or learn about subscription options.pp. 89
Paper Session IV: Fault Analysis
COTS-Based Fault Tolerance in Deep Space: Qualitative and Quantitative Analyses of a Bus Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 97
Paper Session IV: Fault Analysis
Predicting Fault-Prone Software Modules in Embedded Systems with Classification TreesFull-text access may be available. Sign in or learn about subscription options.pp. 105
Panel Session I: Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?
Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?Full-text access may be available. Sign in or learn about subscription options.pp. 115
Panel Session I: Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?
Experience of Using COTS Components for Deep Space MissionsFull-text access may be available. Sign in or learn about subscription options.pp. 116
Panel Session I: Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?
HASE in Wireless SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 117
Panel Session I: Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?
Using COTS Software in High Assurance Control ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 118
Panel Session I: Building High-Assurance Systems Using COTS Components: Whether, Why, When and How?
COTS and High Assurance: An Oxymoron?Full-text access may be available. Sign in or learn about subscription options.pp. 119
Paper Session V: Case Studies
Lessons from 342 Medical Device FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 123
Paper Session V: Case Studies
Identifying Domain Axioms Using Binary Decision DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 132
Paper Session V: Case Studies
Analyzing the Real-Time Properties of a U.S. Navy Signal Processing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 141
Paper Session V: Case Studies
Formally Modeling a Metal Processing Plant and its Closed Loop SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 151
Paper Session VI: Reliable Communications
Real-Time Atomic Transaction Processing Using Multi-Invariant Data StructureFull-text access may be available. Sign in or learn about subscription options.pp. 161
Paper Session VI: Reliable Communications
Autonomous Data Synchronization in Heterogeneous Systems to Assure the TransactionFull-text access may be available. Sign in or learn about subscription options.pp. 169
Paper Session VI: Reliable Communications
Look-Ahead Channel Reservation and Borrowing in Cellular Network SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 179
Paper Session VII: Frameworks, Systems, Tools
Building Dependable Distributed Applications Using AQUAFull-text access may be available. Sign in or learn about subscription options.pp. 189
Paper Session VII: Frameworks, Systems, Tools
A Framework for a Cryptographic Protocol Evaluation WorkbenchFull-text access may be available. Sign in or learn about subscription options.pp. 197
Paper Session VII: Frameworks, Systems, Tools
The Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 207
Paper Session VII: Frameworks, Systems, Tools
On the Requirements of High-Integrity Code GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 217
Panel Session II: What are the Most Critical Challenges to Integrating High Assurance Systems?
What are the Most Critical Challenges to Integrating High Assurance Systems?Full-text access may be available. Sign in or learn about subscription options.pp. 227
Paper Session VIII: Metrics and Modeling
Fault Detectability Analysis for Requirements Validation of Fault Tolerant SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 231
Paper Session VIII: Metrics and Modeling
A Specification-Based Coverage Metric to Evaluate Test SetsFull-text access may be available. Sign in or learn about subscription options.pp. 239
Paper Session VIII: Metrics and Modeling
How Much Testing is Enough? Applying Stopping Rules to Behavioral Model TestingFull-text access may be available. Sign in or learn about subscription options.pp. 249
Paper Session VIII: Metrics and Modeling
A Synchronous Paradigm for Modeling Stable Reactive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 257
Panel Session III: Should High Assurance Systems Use Software? Risk vs. Functionality
Software Systems: Consequence versus FunctionalityFull-text access may be available. Sign in or learn about subscription options.pp. 269
Panel Session III: Should High Assurance Systems Use Software? Risk vs. Functionality
Why Modern Systems Should Minimize the Use of Safety Critical SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 271
Panel Session III: Should High Assurance Systems Use Software? Risk vs. Functionality
An "in the limit" ViewFull-text access may be available. Sign in or learn about subscription options.pp. 272
Panel Session III: Should High Assurance Systems Use Software? Risk vs. Functionality
Software Can Be Entrusted with High Consequence FunctionalityFull-text access may be available. Sign in or learn about subscription options.pp. 273
A world without risks: let me out!Full-text access may be available. Sign in or learn about subscription options.pp. 274-274
Panel Session III: Should High Assurance Systems Use Software? Risk vs. Functionality
Author IndexFreely available from IEEE.pp. 275
Showing 46 out of 46