Most people always want to get reliable information, even if there are intrusions that illegitimate hacker damages to file systemsthrough operations modifying, appending, and deleting files. To accomplish this, we ne...
详细信息
ISBN:
(纸本)0780386019
Most people always want to get reliable information, even if there are intrusions that illegitimate hacker damages to file systemsthrough operations modifying, appending, and deleting files. To accomplish this, we need the recovery function with transparent to user and return to its former state. this paper proposes design and implementation of a log-based intrusion recovery module (LBIRM). It can keep the previous contents of designated files as a chain of logs and recover the damaged file by using the log.
ECSAM is a requirements engineering and modeling method for computer-based systems (CBS). It is practiced and enhanced since 1980 by large numbers of systems and software engineers. ECSAM was developed in part at Isra...
详细信息
ECSAM is a requirements engineering and modeling method for computer-based systems (CBS). It is practiced and enhanced since 1980 by large numbers of systems and software engineers. ECSAM was developed in part at israel Aircraft Industries for the analysis and design of complex reactive embedded systems and software. ECSAM guides the developers in systematic analysis and modeling of systems being developed and describing those using three consistent views; its conceptual architecture, operating modes, and system's capabilities. Each capability is further analyzed and described as a dynamic process. Using ECSAM it is possible to generate systematically the system's use cases and the resulting operational scenarios. the modeling technique is applicable in the analysis of systems and any level of subsystems. the method guides the developer in the derivation of the system requirements and their systematic allocation to and association withthe model's elements at the respective levels. ECSAM was the prime motive for the development of the Statecharts technology developed by Prof. David Harel as part of the method. the paper provides an overview of the ECSAM method.
In recent years, UML has been applied to the development of reactive safety-critical systems, in which the quality of the developed software is a key factor. In this paper we present an approach for the deductive veri...
详细信息
ISBN:
(纸本)3540233075
In recent years, UML has been applied to the development of reactive safety-critical systems, in which the quality of the developed software is a key factor. In this paper we present an approach for the deductive verification of such systems using the PVS interactive theorem prover. Using a PVS specification of a UML kernel language semantics, we generate a formal representation of the UML model. this representation is then verified using TLPVS, our PVS-based implementation of linear temporal logic and some of its proof rules. We apply our method by verifying two examples, demonstrating the feasibility of our approach on models with unbounded event queues, object creation, and variables of unbounded domain. We define a notion of fairness for UML systems, allowing us to verify both safety and liveness properties.
We illustrate how reflection is introduced into the teaching and learning of the human aspects of softwareengineering. We start with explaining the rationale for a reflective mode of thinking and its fitness to the f...
详细信息
We illustrate how reflection is introduced into the teaching and learning of the human aspects of softwareengineering. We start with explaining the rationale for a reflective mode of thinking and its fitness to the field of softwareengineering. then we outline in detail the agenda of a course that deals with human aspects of softwareengineering. It is suggested that the intertwining of a reflective mode of thinking into the education of software engineers in general and especially into a course that focuses on human aspects of softwareengineering enhance students' understanding of the essence of the discipline as well as their professional performance in the field.
作者:
Nadrchal, Stepan P.DCIT Ltd
Jose Martiho 2/407 Prague and Department of Software Engineering Charles University Prague Czech Republic
the paper describes a logical language (called ECL) based on Duration Calculus (DC) for the description of the requirements and behaviour of distributed and/or real-time systems. Purpose of the language is to check th...
详细信息
this paper presents a robust sensor fault reconstruction scheme, using an unknown input observer, applied to an inverted pendulum. the scheme is adapted from existing work in the literature. A suitable interface betwe...
详细信息
this paper presents a robust sensor fault reconstruction scheme, using an unknown input observer, applied to an inverted pendulum. the scheme is adapted from existing work in the literature. A suitable interface between the pendulum and a computer enabled the application. Very good results were obtained.
the literature about real-time systems presents digital control or computer controlled systems as one of its most important practical application field. However, it is very difficult to find in these textbooks real-ti...
详细信息
the literature about real-time systems presents digital control or computer controlled systems as one of its most important practical application field. However, it is very difficult to find in these textbooks real-time control aspects. It seems to be more natural that these applications should be treated as part of digital control courses. In spite of that, control system literature rarely includes extensively the real-time subject and it does normally not pay attention to real-time aspects beyond algorithms and choice of sampling times. the aim of this paper is to highlight important issues about real-time systemsthat should be taken into account at the moment to implement digital control.
the purpose of this paper is to propose a web service oriented approach of integrating applications for both Enterprise Application Integration (EAI) and Business-to-Business (B2B) application integration. For this pu...
详细信息
Ontologies are widely used for capturing and organizing knowledge of a particular domain of interest. this knowledge is usually evolvable and therefore an ontology maintenance process is required to keep the ontologic...
详细信息
One of the main problems in the area of Component-Based softwareengineering (CBSE) is how to facilitate the integration of software components into large-scale and complex systems. A possible solution is to enforce o...
详细信息
ISBN:
(纸本)9789549641387
One of the main problems in the area of Component-Based softwareengineering (CBSE) is how to facilitate the integration of software components into large-scale and complex systems. A possible solution is to enforce on software architecture of the system. the increased importance of architecture in CBSE raises the necessity to explore and develop methods for its formal description. Several languages and notations, named architecture description languages (ADL), were developed for formal system level specification. this paper overviews them and outlines the main directions for their evolution.
暂无评论