default search action
14th ECBS 2007: Tucson, Arizona, USA
- 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 26-29 March 2007, Tucson, Arizona, USA. IEEE Computer Society 2007, ISBN 0-7695-2772-8
Keynote Address
- Janos Sztipanovits:
Composition of Cyber-Physical Systems. 3-6
Architectures
- Andreas W. Liehr, Klaus Buchenrieder:
Generation of Related Performance Simulation Models at an Early Stage in the Design Cycle. 7-14 - Cameron Maxwell, Tim O'Neill, John Leaney:
Formal Architecture Transformation Using Heuristics. 15-24 - Jukka Honkola, Sari Leppänen, Pasi Rinne-Rahkola, Martti Soderlund, Markku Turunen, Kimmo Varpaaniemi:
A Case Study: Applying Lyra in Modeling S60 Camera Functionality. 25-36 - Artem Parakhine, Tim O'Neill, John Leaney:
Application of Bayesian Networks to Architectural Optimisation. 37-44 - David Colquitt, John Leaney:
Expanding the View on Complexity within the Architecture Trade-off Analysis Method. 45-54 - Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. Rozenblit:
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation. 55-62 - Ernest Cachia, Mark Vella:
Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I. 63-70 - Sérgio F. Lopes, Adriano Tavares, João Monteiro, Carlos A. Silva:
Design and Description of a Classification System Framework for Easier Reuse. 71-82
Component-Based System Design
- Hervé Chang, Philippe Collet:
Patterns for Integrating and Exploiting Some Non-Functional Properties in Hierarchical Software Components. 83-92 - Krishnakumar Balasubramanian, Douglas C. Schmidt, Zoltán Molnár, Ákos Lédeczi:
Component-Based System Integration via (Meta)Model Composition. 93-102 - Abdallah Mohamed, Günther Ruhe, Armin Eberlein:
COTS Selection: Past, Present, and Future. 103-114
Distributed Systems Design
- Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi:
Modern Distributed Data Acquisition and Control Systems Based on OPC Techniques. 115-122 - Nanjun Li:
Node-Oriented Modeling and Simulation of IP Networks. 123-132 - M. Muztaba Fuad, Michael J. Oudshoorn:
Transformation of Existing Programs into Autonomic and Self-healing Entities. 133-144 - Zenon Chaczko, Ryszard Klempous, Jan Nikodem, Michal Nikodem:
Methods of Sensors Localization in Wireless Sensor Networks. 145-152 - Ryszard Klempous, Jan Nikodem, Lukasz Radosz, Norbert Raus:
Adaptive Misbehavior Detection in Wireless Sensors Network Based on Local Community Agreement. 153-160 - Chuan Feng, Lizhi Yang, Jerzy W. Rozenblit, Peter Beudert:
Design of a Wireless Sensor Network Based Automatic Light Controller in Theater Arts. 161-170
Embedded Real-Time Software Systems
- Maryline Silly-Chetto, Audrey Marchand:
Dynamic Scheduling of Skippable Periodic Tasks in Weakly-Hard Real-Time Systems. 171-177 - Vaclav Dvorak:
Time- and Space-Efficient Evaluation of Sparse Boolean Functions in Embedded Software. 178-185 - Miroslav Svéda:
End-User DevelopmentFramework for Embedded System Applications. 186-194 - Lucas C. Cordeiro, Raimundo S. Barreto, Rafael Barcelos, Meuse N. Oliveira Jr., Vicente Lucena, Paulo Romero Martins Maciel:
Agile Development Methodology for Embedded Systems: A Platform-Based Design Approach. 195-202 - Jin Hyun Kim, Jin-Young Choi:
Embedded System Modeling Based on Resource-Oriented Model. 203-212 - Peter Zoeteweij, Rui Abreu, Rob Golsteijn, Arjan J. C. van Gemund:
Diagnosis of Embedded Software Using Program Spectra. 213-220 - Matthew Eby, Jan Werner, Gabor Karsai, Ákos Lédeczi:
Integrating Security Modeling into Embedded System Design. 221-228 - Cord Giese, Arnd Schnieders, Jens Weiland:
A Practical Approach for Process Family Engineering of Embedded Control Software. 229-240
Lifecycly Processes and Process Evolution
- Ivonne Erfurth, Wilhelm R. Rossak:
A Look at Typical Difficulties in Practical Software Development from the Developer Perspective - A Field Study and a First Solution Proposal with UPEX. 241-248 - Rodrigo Perozzo Noll, Marcelo Blois Ribeiro:
Ontological Traceability over the Unified Process. 249-255 - Michael Meisinger, Ingolf Krüger:
A Service-Oriented Extension of the V-Modell XT. 256-268
Requirements Elicitation and Analysis
- Li Jiang, Armin Eberlein:
Selecting Requirements Engineering Techniques Based on Project Attributes--A Case Study. 269-278 - Tony Spiteri Staines:
Supporting UML Sequence Diagrams Using a Processor Net Model. 279-286 - Ramya Ravichandar, James D. Arthur, Robert P. Broadwater:
Reconciling Synthesis and Decomposition: A Composite Approach to Capability Identification. 287-298
Model-Based System Development
- Michael Thonhauser, Gernot Schmoelzer, Christian Kreiner:
Model-Based Data Processing with Transient Model Extensions. 299-306 - James H. Hill, Sumant Tambe, Aniruddha S. Gokhale:
Model-Driven Engineering for Development-Time QoS Validation of Component-Based Software Systems. 307-316 - Joshua R. Dick, Kenneth B. Kent, Joseph C. Libby:
A Partitioning Analysis of the .NET Common Language Runtime. 317-326
Medical Applications
- Klaus Buchenrieder:
Dimensionality Reduction for the Control of Powered Upper Limb Prostheses. 327-333 - Byron Purves, David Purves:
Computer Based Psychotherapy for Treatment of Depression andAnxiety. 334-338 - Chuan Feng, Jerzy W. Rozenblit, Allan J. Hamilton:
A Hybrid View in a Laparoscopic Surgery Training System. 339-348
Modeling and Analysis of Complex Sysetms
- Alexander Gruler, Alexander Harhurin, Judith Hartmann:
Modeling the Functionality of Multi-Functional Software Systems. 349-358 - Thomas Triebsees, Uwe M. Borghoff:
A Theory for Model-Based Transformation Applied to Computer-Supported Preservation in Digital Archives. 359-370
Reengineering and Reuse
- Jing Dong, Dushyant S. Lad, Yajing Zhao:
DP-Miner: Design Pattern Discovery Using Matrix. 371-380 - Matthias Riebisch, Sven Wohlfarth:
Introducing Impact Analysis for Architectural Decisions. 381-392
Industrial Applications
- Chia-Chu Chiang:
Reengineering a Legacy Tool for Software Evolution. 393-396 - Herwig Mayr:
I-Navigate: Intelligent, Self-adapting Navigation Maps. 397-404
Reliability, Safety, Dependability, Security
- Galen Rasche, Erin Allwein, Michael S. Moore, Ben Abbott:
Model-Based Cyber Security. 405-412 - Jan Nikodem, Maciej Nikodem:
Secure Communication Trees in Ad Hoc Networks. 413-421 - Ernest Cachia, Mark Micallef:
A Multi-Tier, Multi-Role Security Framework for E-Commerce Systems. 422-432 - Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. Rozenblit:
Alert Fusion for a Computer Host Based Intrusion Detection System. 433-440 - Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit:
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection. 441-447 - Patricia O'Hagan, Edward Hanna, Roy Sterritt, Paul McKay:
Engineering Vertical Orchestration: From Biometric Trace Events to Incident Reporting. 448-458
Doctoral Symposium
- Oliver Skroch:
Validation of Component-Based Software with a Customer Centric Domain Level Approach. 459-466 - Marko Boskovic:
Model-Based Empirical Performance Evaluation Based on Relational Traces. 467-474 - Philipp Liegl:
The Strategic Impact of Service Oriented Architectures. 475-484
Sysetm Assessment, Testing, and Metrics
- Miroslav Popovic, Jelena Kovacevic:
A Statistical Approach to Model-Based Robustness Testing. 485-494 - Stephan Schulz, Jukka Honkola, Antti Huima:
Towards Model-Based Testing with Architecture Models. 495-502 - Gregorio Díaz, Elena Navarro, María-Emilia Cambronero, Valentín Valero, Fernando Cuartero:
Testing Time Goal-Driven Requirements with Model Checking Techniques. 503-514 - Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi Hassaïne:
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. 515-522 - Claudio Talarico, Min-Sung Koh, Esteban Rodriguez-Marek:
System Level Performance Assessment of SOC Processors with SystemC. 523-530
Verification and Validation
- Hugo Barros, Sérgio Vale Aguiar Campos, Mark A. J. Song, Luis E. Zárate:
Exploring Clause Symmetry in a Distributed Bounded Model Checking Algorithm. 531-538 - Imen Zaabar, Narjes Berregeb:
Reasoning about Cryptographic Protocols in Observational Theories. 539-548 - Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence:
IPOG: A General Strategy for T-Way Software Testing. 549-556 - Jinzhao Wu, Wei Yan:
Model Checking of Computer-Based Systems. 557-568
ECBS Model-Based System Devemopment Workshop
- Andrea Schauerhuber, Manuel Wimmer, Wieland Schwinger, Elisabeth Kapsammer, Werner Retschitzegger:
Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML Approach. 569-576 - Joel Huselius, Johan Kraft, Hans Hansson, Sasikumar Punnekkat:
Evaluating the Quality of Models Extracted from Embedded Real-Time Software. 577-585 - Bas Graaf, Arie van Deursen:
Visualisation of Domain-Specific Modelling Languages Using UML. 586-595 - Jing Liu, Josh Dehlinger, Hongyu Sun, Robyn R. Lutz:
State-Based Modeling to Support the Evolution and Maintenance of Safety-Critical Software Product Lines. 596-608
Poster
- Hanees Haniffa, Jerzy W. Rozenblit, Jianfeng Peng, Allan J. Hamilton, Mohamad Salkini:
Motion Planning System for Minimally Invasive Surgery. 609-610 - Matthias Galster, Armin Eberlein, Mahmood Moussavi:
A Process Module to Pre-Process Requirements for Architecting. 611-612
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.