Experience using constraint programming to solve real-life problems has shown that finding an efficient solution to the problem often requires experimentation with different constraint solvers or even building a probl...
详细信息
Network management challenges the frontiers of softwareengineering due to its scale and its complexity. the need for architectures that support understanding and reasoning about its problems and systems is vital. thi...
详细信息
ISBN:
(数字)9783540488880
ISBN:
(纸本)3540658955
Network management challenges the frontiers of softwareengineering due to its scale and its complexity. the need for architectures that support understanding and reasoning about its problems and systems is vital. this paper describes a new software architecture being developed to support network management. the architecture will create more flexible systems with minimal dependencies between their sub-systems. Together withthe definition of open interfaces, this will allow easier integration of third-party software and will lead to a new market for management functionality. the architecture promotes fine-grained distribution as a means to achieve scalability where necessary, but attempts to avoid over-specification by supporting a collection of patterns from which a system designer can choose.
We describe a real-time softwareengineering toolkit called ASSERTS that provides complementary analysis and simulation capabilities to assist the designer of multiprocessor/distributed real-time systems. ASSERTS allo...
详细信息
We present an algebra for programming the itineraries of mobile agents. the algebra contains operators for modelling sequential, parallel, nondeterministic, and conditional mobility behaviour. Iterative behaviour is a...
详细信息
作者:
Eisner, CIBM
Matam Adv Technol Ctr Haifa Res Lab IL-31905 Haifa Israel
Stalmarck's proof procedure is a method of tautology checking that has been used to verify railway interlocking software. Recently, it has been proposed [SS98] that the method has potential to increase the capacit...
详细信息
ISBN:
(纸本)3540665595
Stalmarck's proof procedure is a method of tautology checking that has been used to verify railway interlocking software. Recently, it has been proposed [SS98] that the method has potential to increase the capacity of formal verification tools for hardware. In this paper, we examine this potential in light of an experiment in the opposite direction: the application of symbolic model checking to railway interlocking software previously verified with Stahlmarck's method. We show that these railway systems share important characteristics which distinguish them from most hardware: designs, and that these differences raise some doubts about the applicability of Stalmarck's method to hardware verification.
the Ada95 programming language is widely used for implementation of embedded safety-critical airborne systems and equipment. the RTCA/DO-178B is a mature standard for certifying such systems and equipment through test...
详细信息
ISBN:
(纸本)3540660933
the Ada95 programming language is widely used for implementation of embedded safety-critical airborne systems and equipment. the RTCA/DO-178B is a mature standard for certifying such systems and equipment through testing. this paper focuses on the solution DDC-I will provide for RTCA/DO-178B level A certification of Ada95 applications though its new SCORE compiler/debugger product line and associated test tools products. Furthermore, the paper outlines how the DDC-I approach relates to the work in the ESPRIT OMI/SAFE project which aims at establishing a complete software factory for the development and certification of embedded safety-critical applications.
We present a deductive verification framework that combines deductive reasoning, general purpose decision procedures, and domain- specific reasoning. We address the integration of formal as well as informal domain-spe...
详细信息
Reports a generic object-oriented framework for content-based image retrieval (CBIR) systems. It is designed so that the basic data structures and functionality of a typical CBIR system are provided without sacrificin...
详细信息
A framework for understanding and exploiting embodiment is presented which is not dependent on any specific ontological context. this framework is founded on a new definition of embodiment, based on the relational dyn...
详细信息
the proceedings contain 24 papers. the special focus in this conference is on Web Exploration, Database Technology, Storage, Meta Information, Ontologies, and softwareengineering. the topics include: Querying semanti...
ISBN:
(纸本)3540662251
the proceedings contain 24 papers. the special focus in this conference is on Web Exploration, Database Technology, Storage, Meta Information, Ontologies, and softwareengineering. the topics include: Querying semantically tagged documents on the world-wideweb;strategies for filtering e-mail messages combining content-based and sociological filtering with user-stereotypes;interactive query expansion in a meta-search engine;on the optimization of queries containing regular path expressions;a database array algebra for spatio-temporal data and beyond;dynamic relationships and their propagation and concurrency semantics in object-oriented databases;a deductive object database language;a formal model for multidatabases and its implementation;cost-effective jukebox storage via hybrid file-block caching;onthology-driven integration of scientific repositories;global version management for a federated turbine design environment;from object-process diagrams to a natural object-process language;workflow management in the internet age;a component-based workflow system with dynamic modifications;a temporal reasoning approach to model workflow activities;dynamic configuration and enforcement of access control for mobile components;a data warehousing approach to personalized digital libraries;integrating data mining with relational DBMS and morphological disambiguation for Hebrew search systems.
暂无评论