Sciweavers

COMPSAC
2004
IEEE
13 years 11 months ago
Safety Tactics for Software Architecture Design
The influence of architecture in assurance of system safety is being increasingly recognised in mission-critical software applications. Nevertheless, most architectural strategies...
Weihang Wu, Tim Kelly
COMPSAC
2004
IEEE
13 years 11 months ago
Modular Design of Reactive Systems
: We concentrate on two major aspects of reactive system design: behavior control and modularity. These are studied from a formal point of view, within the framework of action syst...
Cristina Cerschi Seceleanu, Tiberiu Seceleanu
COMPSAC
2004
IEEE
13 years 11 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
COMPSAC
2004
IEEE
13 years 11 months ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
COMPSAC
2004
IEEE
13 years 11 months ago
Mutation-Based Testing Criteria for Timeliness
Temporal correctness is crucial to the dependability of real-time systems. Few methods exist to test for temporal correctness and most existing methods are ad-hoc. A problem with ...
Robert Nilsson, Jeff Offutt, Sten F. Andler
COMPSAC
2004
IEEE
13 years 11 months ago
WS-FIT: A Tool for Dependability Analysis of Web Services
This paper provides an overview of fault injection techniques and their applicability to testing SOAP RPC based web service systems. We also give a detailed example of the WS-FIT ...
Nik Looker, Malcolm Munro, Jie Xu
COMPSAC
2004
IEEE
13 years 11 months ago
Priority Assessment of Software Requirements from Multiple Perspectives
The development of complex software systems involves collecting software requirements from various stakeholders. Often stakeholder perceptions conflict during the requirements eli...
Xiaoqing Frank Liu, Chandra Sekhar Veera, Yan Sun,...
COMPSAC
2004
IEEE
13 years 11 months ago
Protein Functional Motion Query and Visualization
Function is a dynamic property closely related to the conformational mechanisms of the protein structure in its physiological environment. Efficient methods and tools for predicti...
Xiong Liu, Hassan A. Karimi, Lee-Wei Yang, Ivet Ba...
COMPSAC
2004
IEEE
13 years 11 months ago
Adaptive Time-Critical Resource Management Using Time/Utility Functions: Past, Present, and Future
Time/utility function time constraints (or TUFs) and utility accrual (UA) scheduling optimality criteria, constitute, arguably, the most effective and broadest approach for adapti...
Peng Li, Binoy Ravindran, E. Douglas Jensen
COMPSAC
2004
IEEE
13 years 11 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen