default search action
HASE 1998: Washington, D.C., USA
- 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, Proceedings. IEEE Computer Society 1998, ISBN 0-8186-9221-9
Session 1: Formal/Analytic Methods for Dependability
- Mario Dal Cin:
Checking Modification Tolerance. 4-12 - David Coppit, Kevin J. Sullivan:
Formal Specification in Collaborative Design of Critical Software Tools. 13-20 - Ragavan Manian, Joanne Bechta Dugan, David Coppit, Kevin J. Sullivan:
Combining Various Solution Techniques for Dynamic Fault Tree Analysis of Computer Systems. 21-28 - Duane E. Olawsky, Charles Payne, Thomas Sundquist, David Apostal, Todd Fine:
Using Composition to Design Secure, Fault-Tolerant Systems. 29-33
Session 2: Invited Speaker
- Swapna S. Gokhale, Kishor S. Trivedi:
Log-Logistic Software Reliability Growth Model. 34-41 - Ravishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi:
A Flexible Software Architecture for High Availability Computing. 42-49 - K. H. Kim:
ROAFTS: A Middleware Architecture for Real-Time Object-Oriented Adaptive Fault Tolerance Support. 50-63
Panel Session I
- Gary Johnson, John Calvert, Kelly J. Hayhurst, John Janeri, Herbert Hecht:
System Requirements and Analysis Issues for High Assurance Systems. 60-
Keynote Address III
- Ying C. (Bob) Yeh:
Design Considerations in Boeing 777 Fly-By-Wire Computers. 64-73
Session 3: Reliability Modeling
- Denise M. Woit, David V. Mason:
Software Component Independence. 74-81 - Taghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl:
Using Classification Trees for Software Quality Models: Lessons Learned. 82-89 - Donald F. Schenker, Taghi M. Khoshgoftaar:
The Application of Fuzzy Enhanced Case-Based Reasoning for Identifying Fault-Prone Modules. 90-97 - Yashwant K. Malaiya, Jason Denton:
Estimating the Number of Residual Defects. 98-107
Session 4: Invited Speaker
- Calton Pu, Crispin Cowan:
System Survivability through Security Bug Tolerance. 108 - Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai:
Design for Constraint Violation Detection in Safety-Critical Systems. 109-116 - Robert N. Smith, Sourav Bhattacharya:
Fault and Leak Tolerance in Firewall Engineering. 117-123
Session 5: Formal Methods
- Kamel Barkaoui, Jean-François Pradat-Peyre:
Verification in Concurrent Programming with Petri Nets Structural Techniques. 124-133 - Farn Wang, Pao-Ann Hsiung:
Automatic Verification on the Large. 134-141 - Susan Stepney:
Incremental Development of a High Integrity Compiler: Experience from an Industrial Development. 142-149 - Stephen J. H. Yang, Sam Lin, Jonathan Lee, William C. Chu:
Specifying and Verifying Temporal Behavior of High Assurance Systems Using Reachability Tree Logic. 150-157
Session 6: State-of-the-Art Talk
- David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao:
Object-Oriented Software Testing: Some Research and Development. 158-165 - William E. Howden:
Good Enough versus High Assurance Software Testing and Evaluation Methods. 166-177
Keynote Address IV
- Dolores R. Wallace:
Enhancing Competitiveness via a Public Fault & Failure Data Repository . 178-187
Session 7: Design for High Assurance
- Carol L. Hoover, Pradeep K. Khosla:
Analytical Partition of Software Components for Evolvable and Reliable MEMS Design Tools. 188-199 - John M. Covan, J. Arlin Cooper:
Predictable Safety in the Control of High Consequence Systems. 200-204 - Jun Xu, Mukesh Singhal:
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks. 205-208 - Diego Del Gobbo, Marcello R. Napolitano, John Callahan, Bojan Cukic:
Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme. 209-213
Session 8: Fault Analysis and Predication
- Michele Pizza, Lorenzo Strigini, Andrea Bondavalli, Felicita Di Giandomenico:
Optimal Discrimination between Transient and Permanent Faults. 214-223 - Fabrizio Grandoni, Andrea Bondavalli, Silvano Chiaradonna:
A New Heuristic to Discriminate between Transient and Intermittent Faults. 224-231 - Ronjeet Lal, Gwan S. Choi:
Error and Failure Analysis of a UNIX Server. 232-239 - Seung H. Hwang, Gwan S. Choi:
On-Chip Cache Memory Resilience. 240-247 - Eltefaat Shokri, Herbert Hecht:
Matching Software Fault Tolerance with Application Needs. 248-253
Session 9: Testing and Analysis of High-Assurance Systems
- Yu Lei, Kuo-Chung Tai:
In-Parameter-Order: A Test Generation Strategy for Pairwise Testing. 254-261 - Anneliese von Mayrhauser, Andre Bai, Tom Chen, Charles Anderson, Amjad Hajjar:
Fast Antirandom (FAR) Test Generation. 262-269 - Yi Deng, Jiacun Wang:
Integrated Architectural Modeling and Analysis for High-Assurance Command and Control System Design. 270-278 - Tei-Wei Kuo, Yuan-Ting Kao, LihChyun Shu:
A Two-Version Approach for Real-Time Concurrency Control and Recovery. 279-
Session 10: High-Assurance in Intelligent Systems
- Hideo Hanamura, Kinji Mori:
Assurance of Transactions in Allied Heterogeneous Systems by Autonomous Decentralized System Techniques. 288-295 - Shashi Phoha, Eugene Eberbach, Eileen Peluso, Atilla P. Kiraly:
Coordination of Engineering Design Agents for High Assurance in Complex Dynamic System Design. 296-303 - Manuel Aparicio IV, Peter Herman, Wendy Stephens, Anuj K. Jain, Munindar P. Singh:
Agent Information Contracts within Virtual Private Networks. 304-311 - Rajiv Khosla:
Human-Centered Virtual Machine of Problem Solving Agents, Software Agents, Intelligent Agents and Objects. 312-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.