


default search action
HASE 1998: Washington, D.C., USA
- 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, Proceedings. IEEE Computer Society 1998, ISBN 0-8186-9221-9

Session 1: Formal/Analytic Methods for Dependability
- Mario Dal Cin:

Checking Modification Tolerance. 4-12 - David Coppit, Kevin J. Sullivan:

Formal Specification in Collaborative Design of Critical Software Tools. 13-20 - Ragavan Manian, Joanne Bechta Dugan, David Coppit, Kevin J. Sullivan:

Combining Various Solution Techniques for Dynamic Fault Tree Analysis of Computer Systems. 21-28 - Duane E. Olawsky, Charles Payne, Thomas Sundquist, David Apostal, Todd Fine:

Using Composition to Design Secure, Fault-Tolerant Systems. 29-33
Session 2: Invited Speaker
- Swapna S. Gokhale, Kishor S. Trivedi:

Log-Logistic Software Reliability Growth Model. 34-41 - Ravishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi:

A Flexible Software Architecture for High Availability Computing. 42-49 - K. H. Kim:

ROAFTS: A Middleware Architecture for Real-Time Object-Oriented Adaptive Fault Tolerance Support. 50-63
Panel Session I
- Gary Johnson, John Calvert, Kelly J. Hayhurst, John Janeri, Herbert Hecht:

System Requirements and Analysis Issues for High Assurance Systems. 60-
Keynote Address III
- Ying C. (Bob) Yeh:

Design Considerations in Boeing 777 Fly-By-Wire Computers. 64-73
Session 3: Reliability Modeling
- Denise M. Woit, David V. Mason:

Software Component Independence. 74-81 - Taghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl:

Using Classification Trees for Software Quality Models: Lessons Learned. 82-89 - Donald F. Schenker, Taghi M. Khoshgoftaar:

The Application of Fuzzy Enhanced Case-Based Reasoning for Identifying Fault-Prone Modules. 90-97 - Yashwant K. Malaiya, Jason Denton:

Estimating the Number of Residual Defects. 98-107
Session 4: Invited Speaker
- Calton Pu, Crispin Cowan:

System Survivability through Security Bug Tolerance. 108 - Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai:

Design for Constraint Violation Detection in Safety-Critical Systems. 109-116 - Robert N. Smith, Sourav Bhattacharya:

Fault and Leak Tolerance in Firewall Engineering. 117-123
Session 5: Formal Methods
- Kamel Barkaoui, Jean-François Pradat-Peyre:

Verification in Concurrent Programming with Petri Nets Structural Techniques. 124-133 - Farn Wang, Pao-Ann Hsiung

:
Automatic Verification on the Large. 134-141 - Susan Stepney:

Incremental Development of a High Integrity Compiler: Experience from an Industrial Development. 142-149 - Stephen J. H. Yang

, Sam Lin, Jonathan Lee, William C. Chu:
Specifying and Verifying Temporal Behavior of High Assurance Systems Using Reachability Tree Logic. 150-157
Session 6: State-of-the-Art Talk
- David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao:

Object-Oriented Software Testing: Some Research and Development. 158-165 - William E. Howden:

Good Enough versus High Assurance Software Testing and Evaluation Methods. 166-177
Keynote Address IV
- Dolores R. Wallace:

Enhancing Competitiveness via a Public Fault & Failure Data Repository . 178-187
Session 7: Design for High Assurance
- Carol L. Hoover, Pradeep K. Khosla:

Analytical Partition of Software Components for Evolvable and Reliable MEMS Design Tools. 188-199 - John M. Covan, J. Arlin Cooper:

Predictable Safety in the Control of High Consequence Systems. 200-204 - Jun Xu, Mukesh Singhal:

A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. 205-208 - Diego Del Gobbo, Marcello R. Napolitano, John Callahan, Bojan Cukic

:
Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme. 209-213
Session 8: Fault Analysis and Predication
- Michele Pizza, Lorenzo Strigini, Andrea Bondavalli

, Felicita Di Giandomenico:
Optimal Discrimination between Transient and Permanent Faults. 214-223 - Fabrizio Grandoni, Andrea Bondavalli

, Silvano Chiaradonna:
A New Heuristic to Discriminate between Transient and Intermittent Faults. 224-231 - Ronjeet Lal, Gwan S. Choi:

Error and Failure Analysis of a UNIX Server. 232-239 - Seung H. Hwang, Gwan S. Choi:

On-Chip Cache Memory Resilience. 240-247 - Eltefaat Shokri, Herbert Hecht:

Matching Software Fault Tolerance with Application Needs. 248-253
Session 9: Testing and Analysis of High-Assurance Systems
- Yu Lei, Kuo-Chung Tai:

In-Parameter-Order: A Test Generation Strategy for Pairwise Testing. 254-261 - Anneliese von Mayrhauser, Andre Bai, Tom Chen, Charles Anderson

, Amjad Hajjar:
Fast Antirandom (FAR) Test Generation. 262-269 - Yi Deng, Jiacun Wang:

Integrated Architectural Modeling and Analysis for High-Assurance Command and Control System Design. 270-278 - Tei-Wei Kuo

, Yuan-Ting Kao, LihChyun Shu:
A Two-Version Approach for Real-Time Concurrency Control and Recovery. 279-
Session 10: High-Assurance in Intelligent Systems
- Hideo Hanamura, Kinji Mori:

Assurance of Transactions in Allied Heterogeneous Systems by Autonomous Decentralized System Techniques. 288-295 - Shashi Phoha, Eugene Eberbach

, Eileen M. Peluso, Atilla P. Kiraly:
Coordination of Engineering Design Agents for High Assurance in Complex Dynamic System Design. 296-303 - Manuel Aparicio IV, Peter Herman, Wendy Stephens, Anuj K. Jain, Munindar P. Singh

:
Agent Information Contracts within Virtual Private Networks. 304-311 - Rajiv Khosla:

Human-Centered Virtual Machine of Problem Solving Agents, Software Agents, Intelligent Agents and Objects. 312-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














