


default search action
HASE 2007: Dallas, Texas, USA
- Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA. IEEE Computer Society 2007, ISBN 0-7695-3043-5

Keynote
- Ravishankar K. Iyer:

TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base. 3
High Assurance Requirements
- Heather Goldsby, Sascha Konrad, Betty H. C. Cheng:

Goal-Oriented Patterns for UML-Based Modeling of Embedded Systems Requirements. 7-14 - Hongyu Sun, Miriam Hauptman, Robyn R. Lutz:

Integrating Product-Line Fault Tree Analysis into AADL Models. 15-22 - Jon G. Hall, Derek Mannering, Lucia Rapanotti:

Arguing safety with Problem Oriented Software Engineering. 23-32
System Design and Architectures
- Paul Townend, Nik Looker, Dacheng Zhang, Jie Xu, Jianxin Li, Liang Zhong, Jinpeng Huai:

CROWN-C: A High-Assurance Service-Oriented Grid Middleware System. 35-44 - Manish Marwah, Shivakant Mishra, Christof Fetzer:

Systems Architectures for Transactional Network Interface. 45-52 - Simon M. Poulding, Paul Emberson, Iain Bate, John A. Clark:

An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms. 53-62 - Jean-Paul Etienne, Samia Bouzefrane:

A Typed Compositional Language for Real-Time Systems. 63-72
State-of-the-Art Presentation. Security Systems Engineering
- Jeffrey M. Voas, Keith W. Miller:

One in a Baker's Dozen: Debugging Debugging. 75-81 - Wei She, Bhavani Thuraisingham, I-Ling Yen:

Delegation-Based Security Model for Web Services. 82-91
Testing
- Ajitha Rajan, Michael W. Whalen, Mats Per Erik Heimdahl:

Model Validation using Automatically Generated Requirements-Based Tests. 95-104 - Wei-Tek Tsai, Xinyu Zhou, Raymond A. Paul, Yinong Chen, Xiaoying Bai:

A Coverage Relationship Model for Test Case Selection and Ranking for Multi-version Software. 105-112 - Lihua Duan, Yan Wang, Jessica Chen:

Enhanced Traverse of Web Pages. 113-122 - Silke Kuball:

How can Previous Component Use Contribute to Assessing the Use of COTS? 123-130
Security Assurance and Policies
- Manghui Tu, Liangliang Xiao, Hui Ma, I-Ling Yen, Farokh B. Bastani:

Placement in Dependable and Secure Peer-to-Peer Data Grids. 133-140 - Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray:

Vulnerability Discovery in Multi-Version Software Systems. 141-148 - Wissam Mallouli, Ana R. Cavalli:

Testing Security Rules with Decomposable Activities. 149-155 - Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu:

Flexible Authorization with Decentralized Access Control Model for Grid Computing. 156-165
Distributed Systems
- Péter Bokor, Marco Serafini, Áron Sisak, András Pataricza, Neeraj Suri:

Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation. 169-178 - Matthew Gillen, Kurt Rohloff, Prakash Manghwani, Richard E. Schantz:

Scalable, Adaptive, Time-Bounded Node Failure Detection. 179-186 - Jawwad Shamsi, Monica Brockmeyer:

SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths. 187-196
High Assurance Embedded Systems
- Anjali Joshi, Mats Per Erik Heimdahl:

Behavioral Fault Modeling for Model-based Safety Analysis. 199-208 - Victor L. Winter, Azamatbek Mametjanov, Steven E. Morrison, James A. McCoy, Gregory L. Wickstrom:

Transformation-Based Library Adaptation for Embedded Systems. 209-218 - Akio Shiibashi, Tsuyoshi Nakaniwa, Motoharu Yamana, Kinji Mori:

Multi-layered Data Consistency Technology, An Enhanced Autonomous Decentralized Data Consistency Technology for IC Card Ticket System. 219-226 - Shige Wang:

Model Transformation for High-Integrity Software Development in Derivative Vehicle Control System Design. 227-234
State-of-the-Art Presentation. Software Engineering for High Assurance Systems
- David Lorge Parnas, Sergiy A. Vilkomir:

Precise Documentation of Critical Software. 237-244 - Joanne Bechta Dugan, Ganesh J. Pai, Hong Xu:

Combining Software Quality Analysis with Dynamic Event/Fault Trees for High Assurance Systems Engineering. 245-255 - Wu-Hon F. Leung:

On the Verifiability of Programs Written in the Feature Language Extensions. 256-263
Fault Tolerance and Availability
- Atef Mohamed, Mohammad Zulkernine:

Improving Reliability and Safety by Trading off Software Failure Criticalities. 267-274 - Ali Ebnenasir, Betty H. C. Cheng:

Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML. 275-282 - Xiaohu Li, T. Paul Parker, Shouhuai Xu:

A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. 283-290 - Eze Kamanu, Pratapa Reddy, Kenneth Hsu, Marcin Lukowiak:

A New Architecture for Single-Event Detection & Reconfiguration of SRAM-based FPGAs. 291-298
Panel
- Alexander B. Romanovsky:

On Exceptions, Exception Handling, Requirements and Software Lifecycle. 301
Empirical Analysis
- Francesco Romani, Silvano Chiaradonna, Felicita Di Giandomenico, Luca Simoncini:

Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies. 305-312 - Michael F. Siok, Jeff Tian:

Empirical Study of Embedded Software Quality and Productivity. 313-320 - Marc Haberkorn, Kishor S. Trivedi:

Availability Monitor for a Software Based System. 321-328
Formal Verification and Validation
- John S. Fitzgerald, Simon Tjell, Peter Gorm Larsen

, Marcel Verhoef:
Validation Support for Distributed Real-Time Embedded Systems in VDM++. 331-340 - Salamah Salamah, Ann Q. Gates, Vladik Kreinovich, Steve Roach:

Verification of Automatically Generated Pattern-Based LTL Specifications. 341-348 - Shaoying Liu:

Utilizing Test Case Generation to Inspect Formal Specifications for Completeness and Feasibility. 349-356 - Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, Shengchao Qin

:
Multiple Pre/Post Specifications for Heap-Manipulating Methods. 357-364
Fault Tolerance
- Stefan Brüning, Stephan Weißleder, Miroslaw Malek:

A Fault Taxonomy for Service-Oriented Architecture. 367-368 - David Y. Feinstein, V. S. S. Nair, Mitchell A. Thornton

:
Advances in Quantum Computing Fault Tolerance and Testing. 369-370 - Ronald J. Leach:

Preliminary Models of the Cost of Fault Tolerance. 371-372 - Yan Liu, Michael Jiang, David Raymer:

Adding Autonomic Capabilities to Network Fault Management System. 373-374
Security
- Asesh Das:

Information Assurance Architecture with Storyboarding Models. 377-378 - Manuel Mendonça, Nuno Ferreira Neves:

Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. 379-380 - Michael D. DiRossi:

Towards a High Assurance Secure Computing Platform. 381-382
Requirements and Design
- Kurt Rohloff, Joseph P. Loyall, Partha P. Pal, Richard E. Schantz:

High-Assurance Distributed, Adaptive Software for Dynamic Systems. 385-386 - P. C. Donachy, Ronald H. Perrott, Terence J. Harmer, F. Sharkey:

Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid Infrastructures. 387-388 - Sung-Ook Shin, Jung-Oog Lee, Doo-Kwon Baik:

A Mobile Agent-based Multi-Robot Design Method for High-Assurance. 389-390 - Jeong-Oog Lee, Ho-Jun Lee:

Building High Assurance Multidisciplinary Design Optimization Framework. 391-392
Web, E-Commerce, and Enterprise
- Nasser Alaeddine, Jeff Tian:

Analytic Model for Web Anomalies Classification. 395-396 - Masato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiaki Kakuda:

Development of Custom Selling System Using Ad Hoc Networks. 397-398 - Shaofei Wu, Shixian Wang:

Research on Noise Problem of Reputation Estimation in Virtual Enterprise. 399-400
Quality, Reliability, and Safety
- Ali Mili, Frederick T. Sheldon:

Measuring Reliability as a Mean Failure Cost. 403-404 - Stephen W. Cook, Bjarne Stroustrup, Scott M. Pike:

An Early-Reply Based Framework: Reliable Concurrency that Is Verifiable. 405-406 - Jason D. Lee, Praveen Bhojwani, Rabi N. Mahapatra:

A Safety Analysis Framework for COTS Microprocessors in Safety-Critical Applications. 407-408 - Branson W. Murrill:

Automated Test Data Generation and Reliability Assessment for Software in High Assurance Systems. 409-410 - Miyoung Shin, Sunida Ratanothayanon, Amrit L. Goel, Raymond A. Paul:

Parsimonious Classifiers for Software Quality Assessment. 411-412
Formal Methods and Its Applications
- Eduardo Rafael López Ruiz:

Methodology for Evaluating Aeronautical Regulations using Formal Specifications. 415-416 - Luis García, Steve Roach:

Model-Checker-Based Testing of LTL Specifications. 417-418 - Lihua Duan, Jessica Chen:

A Formal Approach to Website Maintenance. 419-420
Systems and Networks
- Manghui Tu, Nasser Tadayon, Zhonghang Xia, Enyue Lu:

A Secure and Scalable Update Protocol for P2P Data Grids. 423-424 - Xin Wang, Xiaochen Zhang, Shuang Yang, Xiangyang Xue:

Design of a Fairness Guarantee Mechanism Based on Network Measurement. 425-426 - Ekpe Okorafor:

All-Optical Routing for High Assurance Computer Systems. 427-428 - Nitin Auluck:

Duplication Based Integrated Task and Message Scheduling on a Heterogeneous Network of Workstations (NOWs). 429-430
Systems and Applications
- Ismail Assayad, Sergio Yovine:

Modelling and Exploration Environment for Application Specific Multiprocessor Systems. 433-434 - Qi Zhang, Carlos Rendón, Veronica Montes De Oca, Daniel R. Jeske, Mazda Marvasti:

A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance. 435-436 - Jeong-Oog Lee, Dae Hee Won, Sangkyung Sung, Taesam Kang, Young Jae Lee:

High Assurance GPS Integrity Monitoring System Using Particle Filtering Approach. 437-438

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














