No abstract available.
A Panacea or Academic Poppycock: Formal Methods Revisited
Many formal methods have been proposed in recent years to improve software quality. These include newspecification and modeling languages as well as formal verification techniques, such as model checking and theorem proving. This paper describes several ...
Tomorrow's Needs — Yesterday's Technology: DOD's Architectural Dilemma and Plan for Resolution
As Department of Defense (DoD) is moving rapidly towards Service-Oriented Computing (SOC), new challenges arise. SOC represents a new and emerging paradigm of computing. The new paradigm will affect every phase of system development and operation. This ...
Design and Analysis of Fault Tolerant Architectures by Model Weaving
Aspect-oriented modeling is proposed to design the architecture of fault tolerant systems. Notations are introduced that support the separate and modularized design of functional and dependability aspects in UML class diagrams. This notation designates ...
Safe Allocation of Avionics Shared Resources
We propose an approach to analyse the safety of avionic systems that takes into account the impact of computation and communication resource sharing. The approach is made of three main steps: use a formal notation to describe how failures propagate in ...
The Reliable Platform Service: A Property-Based Fault Tolerant Service Architecture
The Reliable Platform is a fault tolerant architecture designed to provide a structured but flexible framework for the delivery of dependable services for highly critical applications such as X-by-wire systems. The approach is based on defining a ...
Supporting Component and Architectural Re-usage by Detection and Tolerance of Integration Faults
We present an extended interface description language supporting the avoidance and the automatic detection and tolerance of inconsistency classes likely to occur when integrating pre-developed components. In particular, the approach developed allows the ...
A Framework for Simplifying the Development of Kernel Schedulers: Design and Performance Evaluation
Writing a new scheduler and integrating it into an existing OS is a daunting task, requiring the understanding of multiple low-level kernel mechanisms. Indeed, implementing a new scheduler is outside the expertise of application programmers, even though ...
A Novel Framework for Non-Deterministic Testing of Message-Passing Programs
Message-passing programs are difficult to test because of their non-deterministic behavior. One approach, called non-deterministic testing, involves executing a message-passing program with the same input many times in hope that faults will be exposed ...
Safe Composition of Real Time Software
There is an increasing move towards the use of modular approaches to software design and implementation in the development of critical systems. The reason is the approaches have a number of benefits including providing support for concurrent development ...
Analyzing Software Quality with Limited Fault-Proneness Defect Data
Assuring whether the desir ed software quality and reliability is met for a project is as important as deliveringit within scheduled budget and time. This is especially vital for high-assurance software systems where software failures can have severe ...
Structured Assurance Cases: Three Common Standards
For safety-, mission-, or security-critical systems, there are typically regulations or acquisition guidelines requiring a documented body of evidence to provide a compelling justification that the system satisfies specified critical properties. Current ...
Automatic Generation of Executable Assertions for Runtime Checking Temporal Requirements
Checking various temporal requirements is a key dependability concern in safety-critical systems. As model-checking approaches do not scale well to systems of high complexity the runtime verification of temporal requirements has received a growing ...
View Graphs for Analysis and Testing of Programs at Different Abstraction Levels
This paper introduces view graphs, which allow representation of source code for program analysis and testing at different levels of abstraction. At a low level of abstraction, view graphs can be used for white-box analysis and testing, and at a high ...
The Simulation of Anomalies in the Functional Testing of the ERTMS/ETCS Trackside System
ERTMS/ETCS is going to become the reference standard for modern railway signalling. To develop a safe and reliable Automatic Train Protection System (ATPS) based on ERTMS/ETCS, a detailed functional testing phase is needed, meeting the requirements of ...
Bayesian Perspective of Optimal Checkpoint Placement
Checkpointing and rollback recovery is a commonly used technique to save the information on the main memory in file systems to a safe secondary medium. In this paper we develop fully Bayesian learning algorithms to place the checkpoint adaptively. Based ...
Linear Randomized Voting Algorithm for Fault Tolerant Sensor Fusion and the Corresponding Reliability Model
Sensor failures in process control programs can be tolerated through application of well known modular redundancy schemes. The reliability of a specific modular redundancy scheme depends on the predefined number of sensors thatmay fail, f, out of the ...
Using Repairable Fault Trees for the Evaluation of Design Choices for Critical Repairable Systems
Critical repairable systems are characterized by complex architecture and requirements. The evaluation of benefits produced by repair policies on the overall system availability is not straightforward, as policies can be very articulated and different. ...