


default search action
14th ECBS 2007: Tucson, Arizona, USA
- 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 26-29 March 2007, Tucson, Arizona, USA. IEEE Computer Society 2007, ISBN 0-7695-2772-8

Keynote Address
- Janos Sztipanovits:

Composition of Cyber-Physical Systems. 3-6
Architectures
- Andreas W. Liehr, Klaus Buchenrieder

:
Generation of Related Performance Simulation Models at an Early Stage in the Design Cycle. 7-14 - Cameron Maxwell, Tim O'Neill, John Leaney

:
Formal Architecture Transformation Using Heuristics. 15-24 - Jukka Honkola, Sari Leppänen, Pasi Rinne-Rahkola, Martti Soderlund, Markku Turunen, Kimmo Varpaaniemi:

A Case Study: Applying Lyra in Modeling S60 Camera Functionality. 25-36 - Artem Parakhine, Tim O'Neill, John Leaney

:
Application of Bayesian Networks to Architectural Optimisation. 37-44 - David Colquitt, John Leaney

:
Expanding the View on Complexity within the Architecture Trade-off Analysis Method. 45-54 - Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. Rozenblit:

An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation. 55-62 - Ernest Cachia, Mark Vella:

Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I. 63-70 - Sérgio F. Lopes

, Adriano Tavares
, João Monteiro
, Carlos A. Silva
:
Design and Description of a Classification System Framework for Easier Reuse. 71-82
Component-Based System Design
- Hervé Chang, Philippe Collet:

Patterns for Integrating and Exploiting Some Non-Functional Properties in Hierarchical Software Components. 83-92 - Krishnakumar Balasubramanian, Douglas C. Schmidt, Zoltán Molnár, Ákos Lédeczi:

Component-Based System Integration via (Meta)Model Composition. 93-102 - Abdallah Mohamed, Günther Ruhe, Armin Eberlein

:
COTS Selection: Past, Present, and Future. 103-114
Distributed Systems Design
- Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi:

Modern Distributed Data Acquisition and Control Systems Based on OPC Techniques. 115-122 - Nanjun Li:

Node-Oriented Modeling and Simulation of IP Networks. 123-132 - M. Muztaba Fuad

, Michael J. Oudshoorn
:
Transformation of Existing Programs into Autonomic and Self-healing Entities. 133-144 - Zenon Chaczko, Ryszard Klempous

, Jan Nikodem, Michal Nikodem:
Methods of Sensors Localization in Wireless Sensor Networks. 145-152 - Ryszard Klempous

, Jan Nikodem, Lukasz Radosz, Norbert Raus:
Adaptive Misbehavior Detection in Wireless Sensors Network Based on Local Community Agreement. 153-160 - Chuan Feng, Lizhi Yang, Jerzy W. Rozenblit, Peter Beudert:

Design of a Wireless Sensor Network Based Automatic Light Controller in Theater Arts. 161-170
Embedded Real-Time Software Systems
- Maryline Silly-Chetto

, Audrey Marchand:
Dynamic Scheduling of Skippable Periodic Tasks in Weakly-Hard Real-Time Systems. 171-177 - Vaclav Dvorak:

Time- and Space-Efficient Evaluation of Sparse Boolean Functions in Embedded Software. 178-185 - Miroslav Svéda:

End-User DevelopmentFramework for Embedded System Applications. 186-194 - Lucas C. Cordeiro

, Raimundo S. Barreto
, Rafael Barcelos, Meuse N. Oliveira Jr., Vicente Lucena
, Paulo Romero Martins Maciel:
Agile Development Methodology for Embedded Systems: A Platform-Based Design Approach. 195-202 - Jin Hyun Kim, Jin-Young Choi

:
Embedded System Modeling Based on Resource-Oriented Model. 203-212 - Peter Zoeteweij, Rui Abreu

, Rob Golsteijn, Arjan J. C. van Gemund:
Diagnosis of Embedded Software Using Program Spectra. 213-220 - Matthew Eby, Jan Werner, Gabor Karsai

, Ákos Lédeczi:
Integrating Security Modeling into Embedded System Design. 221-228 - Cord Giese, Arnd Schnieders, Jens Weiland:

A Practical Approach for Process Family Engineering of Embedded Control Software. 229-240
Lifecycly Processes and Process Evolution
- Ivonne Erfurth, Wilhelm R. Rossak:

A Look at Typical Difficulties in Practical Software Development from the Developer Perspective - A Field Study and a First Solution Proposal with UPEX. 241-248 - Rodrigo Perozzo Noll, Marcelo Blois Ribeiro:

Ontological Traceability over the Unified Process. 249-255 - Michael Meisinger, Ingolf Krüger:

A Service-Oriented Extension of the V-Modell XT. 256-268
Requirements Elicitation and Analysis
- Li Jiang, Armin Eberlein

:
Selecting Requirements Engineering Techniques Based on Project Attributes--A Case Study. 269-278 - Tony Spiteri Staines:

Supporting UML Sequence Diagrams Using a Processor Net Model. 279-286 - Ramya Ravichandar, James D. Arthur, Robert P. Broadwater:

Reconciling Synthesis and Decomposition: A Composite Approach to Capability Identification. 287-298
Model-Based System Development
- Michael Thonhauser, Gernot Schmoelzer, Christian Kreiner

:
Model-Based Data Processing with Transient Model Extensions. 299-306 - James H. Hill, Sumant Tambe, Aniruddha S. Gokhale

:
Model-Driven Engineering for Development-Time QoS Validation of Component-Based Software Systems. 307-316 - Joshua R. Dick, Kenneth B. Kent

, Joseph C. Libby:
A Partitioning Analysis of the .NET Common Language Runtime. 317-326
Medical Applications
- Klaus Buchenrieder

:
Dimensionality Reduction for the Control of Powered Upper Limb Prostheses. 327-333 - Byron Purves, David Purves:

Computer Based Psychotherapy for Treatment of Depression andAnxiety. 334-338 - Chuan Feng, Jerzy W. Rozenblit, Allan J. Hamilton:

A Hybrid View in a Laparoscopic Surgery Training System. 339-348
Modeling and Analysis of Complex Sysetms
- Alexander Gruler, Alexander Harhurin, Judith Hartmann:

Modeling the Functionality of Multi-Functional Software Systems. 349-358 - Thomas Triebsees, Uwe M. Borghoff

:
A Theory for Model-Based Transformation Applied to Computer-Supported Preservation in Digital Archives. 359-370
Reengineering and Reuse
- Jing Dong, Dushyant S. Lad, Yajing Zhao:

DP-Miner: Design Pattern Discovery Using Matrix. 371-380 - Matthias Riebisch, Sven Wohlfarth:

Introducing Impact Analysis for Architectural Decisions. 381-392
Industrial Applications
- Chia-Chu Chiang:

Reengineering a Legacy Tool for Software Evolution. 393-396 - Herwig Mayr:

I-Navigate: Intelligent, Self-adapting Navigation Maps. 397-404
Reliability, Safety, Dependability, Security
- Galen Rasche, Erin Allwein, Michael S. Moore, Ben Abbott:

Model-Based Cyber Security. 405-412 - Jan Nikodem, Maciej Nikodem:

Secure Communication Trees in Ad Hoc Networks. 413-421 - Ernest Cachia, Mark Micallef:

A Multi-Tier, Multi-Role Security Framework for E-Commerce Systems. 422-432 - Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. Rozenblit:

Alert Fusion for a Computer Host Based Intrusion Detection System. 433-440 - Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit:

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection. 441-447 - Patricia O'Hagan, Edward Hanna, Roy Sterritt

, Paul McKay:
Engineering Vertical Orchestration: From Biometric Trace Events to Incident Reporting. 448-458
Doctoral Symposium
- Oliver Skroch:

Validation of Component-Based Software with a Customer Centric Domain Level Approach. 459-466 - Marko Boskovic:

Model-Based Empirical Performance Evaluation Based on Relational Traces. 467-474 - Philipp Liegl:

The Strategic Impact of Service Oriented Architectures. 475-484
Sysetm Assessment, Testing, and Metrics
- Miroslav Popovic

, Jelena Kovacevic:
A Statistical Approach to Model-Based Robustness Testing. 485-494 - Stephan Schulz, Jukka Honkola, Antti Huima:

Towards Model-Based Testing with Architecture Models. 495-502 - Gregorio Díaz

, Elena Navarro
, María-Emilia Cambronero, Valentín Valero
, Fernando Cuartero:
Testing Time Goal-Driven Requirements with Model Checking Techniques. 503-514 - Yosr Jarraya, Andrei Soeanu, Mourad Debbabi

, Fawzi Hassaïne:
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams. 515-522 - Claudio Talarico, Min-Sung Koh, Esteban Rodriguez-Marek:

System Level Performance Assessment of SOC Processors with SystemC. 523-530
Verification and Validation
- Hugo Barros, Sérgio Vale Aguiar Campos, Mark A. J. Song, Luis E. Zárate

:
Exploring Clause Symmetry in a Distributed Bounded Model Checking Algorithm. 531-538 - Imen Zaabar, Narjes Berregeb:

Reasoning about Cryptographic Protocols in Observational Theories. 539-548 - Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence:

IPOG: A General Strategy for T-Way Software Testing. 549-556 - Jinzhao Wu, Wei Yan:

Model Checking of Computer-Based Systems. 557-568
ECBS Model-Based System Devemopment Workshop
- Andrea Schauerhuber, Manuel Wimmer, Wieland Schwinger, Elisabeth Kapsammer, Werner Retschitzegger

:
Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML Approach. 569-576 - Joel Huselius, Johan Kraft, Hans Hansson

, Sasikumar Punnekkat
:
Evaluating the Quality of Models Extracted from Embedded Real-Time Software. 577-585 - Bas Graaf

, Arie van Deursen
:
Visualisation of Domain-Specific Modelling Languages Using UML. 586-595 - Jing Liu, Josh Dehlinger, Hongyu Sun, Robyn R. Lutz

:
State-Based Modeling to Support the Evolution and Maintenance of Safety-Critical Software Product Lines. 596-608
Poster
- Hanees Haniffa, Jerzy W. Rozenblit, Jianfeng Peng, Allan J. Hamilton, Mohamad Salkini:

Motion Planning System for Minimally Invasive Surgery. 609-610 - Matthias Galster, Armin Eberlein

, Mahmood Moussavi:
A Process Module to Pre-Process Requirements for Architecting. 611-612

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














