Although adoption of a software process model or method can realise significant benefits, there is generally a need to provide a level of computerised support if it is to be usefully applied to large real-world system...
详细信息
We present a logical framework in which abstract interpretations can be naturally specified and then verified. Our approach is based on membership equational logic which extends equational logics by membership axioms,...
We present a logical framework in which abstract interpretations can be naturally specified and then verified. Our approach is based on membership equational logic which extends equational logics by membership axioms, asserting that a term has a certain sort. We represent an abstract interpretation as a membership equational logic specification, usually as an overloaded order-sorted signature with membership axioms. It turns out that, for any term, its least sort over this specification corresponds to its most concrete abstract value. Maude implements membership equational logic and provides mechanisms to calculate the least sort of a term efficiently. We first show how Maude can be used to get prototyping of abstract interpretations “for free.” Building on the meta-logic facilities of Maude, we further develop a tool that automatically checks an abstract interpretation against a set of user-defined properties. This can be used to select an appropriate abstract interpretation, to characterize the specific loss of information during abstraction, and to compare different abstractions with each other.
The concept of collaborations capturing dynamic aspects of a distributed system across agent boundaries is elaborated in the context of SDL-2000. Several ways of composing collaborations are introduced, with collabora...
详细信息
This paper introduces an innovative visualisation technique for exposing the software defects that develop as a software project evolves. The application of this technique to a large-scale industrial software project ...
详细信息
There exist some studies in proportional scheduling algorithms for differentiated service networks which schedule the packets between different classes proportionally based on certain metrics, such as bandwidth, loss ...
详细信息
Proof-checking code for compliance to safety policies potentially enables a product-oriented approach to certain aspects of software certification. To date, previous research has focused on generic, low-level programm...
详细信息
ISBN:
(纸本)076951426X
Proof-checking code for compliance to safety policies potentially enables a product-oriented approach to certain aspects of software certification. To date, previous research has focused on generic, low-level programming-language properties such as memory type safety. In this paper we consider proof-checking higher-level domain-specific properties for compliance to safety policies. The paper first describes a framework related to abstract interpretation in which compliance to a class of certification policies can be efficiently calculated. Membership equational logic is shown to provide a rich logic for carrying out such calculations, including partiality, for certification. The architecture for a domain-specific certifier is described, followed by an implemented case study. The case study considers consistency of abstract variable attributes in code that performs geometric calculations in Aerospace systems.
There exist some studies in proportional scheduling algorithms for differentiated service networks which schedule the packets between different classes proportionally based on certain metrics, such as bandwidth, loss ...
详细信息
ISBN:
(纸本)0769514324
There exist some studies in proportional scheduling algorithms for differentiated service networks which schedule the packets between different classes proportionally based on certain metrics, such as bandwidth, loss and delay. In this paper, the behaviors of RJPS (Relative Jitter Packet Scheduler) and another proportional delay scheduler (WTP), as well as its influence on the playout buffer, which uses the Concord delay adjustment algorithm, are examined. Our simulations show that RJPS is more convergent and produces a smaller delay than WTP via the same network with the same loss rate. Finally, we propose a network using both RJPS and WTP for minimizing the network delay of each class.
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically gene...
详细信息
ISBN:
(纸本)0769509819
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically generated from digest video scenes selected by user preference. (2) Directions can be added using a happiness or sadness level based on the user preferences. (3) Personalized TV programs for an individual viewer can be made. The procedures taken by the system are as follows: (1) Conjunctive expressions between scenes are automatically generated; (2) Emotional expressions are automatically generated by user preference; (3) TV program metaphors are defined; (4) Direction templates corresponding to the metaphors are defined; (5) These expressions and definitions are coded using a markup language, and (6) Contents such as virtual characters and movies are synchronized. The resultant program can be shown on a TV set.
We describe a methodology for precise quantitative measurement of technology impact on software change effort. The methodology employs measures of small software changes to determine the effect of technology. We illus...
详细信息
We describe a methodology for precise quantitative measurement of technology impact on software change effort. The methodology employs measures of small software changes to determine the effect of technology. We illustrate this approach in a detailed case study on the impact of using two particular technologies-a version-sensitive source code editor and a domain-engineered application environment-in a telecommunications product In both cases, the change effort was reduced. The methodology can precisely measure cost savings in change effort and is simple and inexpensive, since it relies on information automatically collected by Version control systems.
A variety of hazard analysis techniques have been proposed for software-based systems but individually the techniques are limited in their ability to cope with system complexity, or to derive and prioritise component ...
详细信息
暂无评论