The Community for Technology Leaders
Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05) (2004)
Tampa, Florida
Mar. 25, 2004 to Mar. 26, 2004
ISSN: 1530-2059
ISBN: 0-7695-2094-4
TABLE OF CONTENTS
Introduction

Reviewers (PDF)

pp. xiii-xiv
Session 1: Design Assurance

Decomposition of Fairness and Performance Aspects for High-Assurance Continuous Process-Control Systems (Abstract)

Hui Ma , University of Texas at Dallas
Farokh B. Bastani , University of Texas at Dallas
I-Ling Yen , University of Texas at Dallas
Dongfeng Wang , University of Texas at Dallas
pp. 3-11

Software Fault Tree Analysis for Product Lines (Abstract)

Robyn R. Lutz , Iowa State University and Jet Propulsion Laboratory
Josh Dehlinger , Iowa State University
pp. 12-21

Flexible Design of Complex High-Integrity Systems Using Trade Offs (Abstract)

Iain Bate , University of York
Neil Audsley , University of York
pp. 22-31

Multi-View Modeling and Analysis of Embedded Real-Time Software with Meta-Modeling and Model Transformation (Abstract)

Sharath Kodase , University of Michigan
Kang G. Shin , University of Michigan
Shige Wang , University of Michigan
Zonghua Gu , University of Michigan
pp. 32-41
Session 2: Knowledge Based System Assurance Techniques

Knowledge-Centric and Language Independent Framework for Safety Analysis Tools (Abstract)

Jeremias Sauceda , Iowa State University
Luke Bishop , Iowa State University
Gary Daugherty , Rockwell Collins
S. C. Kothari , Iowa State University
pp. 45-55

Reducing Overfitting in Genetic Programming Models for Software Quality Classification (Abstract)

Taghi Khoshgoftaar , Florida Atlantic University
Yi Liu , Georgia College and State University
pp. 56-65
Session 3: Fault Tolerant System Design and Analysis

An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems (Abstract)

Arshad Jhumka , Technical University at Darmstadt
Neeraj Suri , Technical University at Darmstadt
pp. 69-78

Decentralized Workload Management for Assurance According to Heterogeneous Service Levels (Abstract)

Kinji Mori , Tokyo Institute of Technology
Yasushi Kuba , Hitachi, Ltd.
Ivan Luque , Tokyo Institute of Technology
Misato Tasaka , Tokyo Institute of Technology
Xiaodong Lu , Tokyo Institute of Technology
pp. 79-88

Structural Analysis of Explicit Fault-Tolerant Programs (Abstract)

Stefan Gossens , University of Erlangen-Nuremberg
Mario Dal Cin , University of Erlangen-Nuremberg
pp. 89-96
Session 4: System Level Test Methodologies

Multi-Function System Testing: Composition of Test Sets (Abstract)

Mark Sh. Levin , Ben-Gurion University
Mark Last , Ben-Gurion University
pp. 99-108

Testing Large Scale Streaming Internet Applications over Wireless LANs (Abstract)

John Shahbazian , University of South Florida
Kenneth J. Christensen , University of South Florida
Praveen Ikkurthy , University of South Florida
Miguel A. Labrador , University of South Florida
pp. 109-115

Knowledge Management for Computational Intelligence Systems (Abstract)

Duanqing Wu , Drexel University
Rosina Weber , Drexel University
pp. 116-125
Session 5: Quantitative and Model Based Approaches

How Good Is Your Blind Spot Sampling Policy? (Abstract)

Tim Menzies , West Virginia University
Justin S. Di Stefano , Galaxy Global Corporation
pp. 129-138

Unsupervised Learning for Expert-Based Software Quality Estimation (Abstract)

Naeem Seliya , Florida Atlantic University
Taghi M. Khoshgoftaar , Florida Atlantic University
Shi Zhong , Florida Atlantic University
pp. 149-155
Session 6: Formal Approaches to System Verification

The SSP: An Example of High-Assurance Systems Engineering (Abstract)

Jared Davis , University of Texas at Austin
Steve Roach , University of Texas at El Paso
Steven E. Morrison , Sandia National Laboratories
Victor L. Winter , University of Nebraska at Omaha
Gregory L. Wickstrom , Sandia National Laboratories
pp. 167-177

Specification Test Coverage Adequacy Criteria = Specification Test Generation Inadequacy Criteria? (Abstract)

Devaraj George , University of Minnesota
Mats P.E. Heimdahl , University of Minnesota
Robert Weber , University of Minnesota
pp. 178-186

RUBASTEM: A Method for Testing VHDL Behavioral Models (Abstract)

Anneliese Andrews , Washington State University
Tom Chen , Colorado State University
Andrew O?Fallon , Washington State University
pp. 187-196

A Formal Specification-Based Approach to Distributed Parallel Programming (Abstract)

Chia-Chu Chiang , University of Arkansas at Little Rock
pp. 197-205
Session 7: Reliability Modeling for Dependable Systems

EM Algorithm for Discrete Software Reliability Models: A Unified Parameter Estimation Method (Abstract)

Tadashi Dohi , Hiroshima University
Hiroyuki Okamura , Hiroshima University
Atsushi Murayama , Hiroshima University
pp. 219-228
Session 8: Design and Assessment of Secure Systems

Multiparty Computation with Full Computation Power and Reduced Overhead (Abstract)

Wei Hao , University of Texas at Dallas
Qingkai Ma , University of Texas at Dallas
I-Ling Yen , University of Texas at Dallas
Farokh Bastani , University of Texas at Dallas
pp. 241-248

Resource-Sensitive Intrusion Detection Models for Network Traffic (Abstract)

Mohamed E. Abushadi , Florida Atlantic University
Taghi M Khoshgoftaar , Florida Atlantic University
pp. 249-258
Session 1FA: NISTP Abstracts

Automated Detection of Injected Faults in a Differential Equation Solver (PDF)

Mark Last , Ben-Gurion University of the Negev
Menahem Friedman , Nuclear Research Center — Negev
pp. 263-264

Automated Detection of Injected Faults in a Differential Equation Solver Network Systems Development (PDF)

Gwendolyn Walton , Florida Southern College
Richard C. Linger , Carnegie Mellon University
Mark G. Pleszkoch , Carnegie Mellon University
Alan R. Hevner , University of South Florida
pp. 265-266
Session 2FA

Evaluation of Software Development Tools for High Assurance Safety Critical Systems (PDF)

Darryl Hearn , Embry-Riddle Aeronautical University
Janusz Zalewski , Florida Gulf Coast University
Andrew J. Kornecki , Embry-Riddle Aeronautical University
Herman Lau , Embry-Riddle Aeronautical University
Kimberley Hall , Embry-Riddle Aeronautical University
pp. 273-274

Autonomous Rating Oriented Agent Allocation to Achieve High Response in Demand-Oriented Information Service System (PDF)

Misato Tasaka , Tokyo Institute of Technology
Ryuji Takanuki , Hitachi, Ltd.
Xiaodong Lu , Tokyo Institute of Technology
Ivan Luque , Tokyo Institute of Technology
Yi Zhou , Tokyo Institute of Technology
Kinji Mori , Tokyo Institute of Technology
pp. 275-276

Developing a Data Driven Prognostic System with Limited System Information (PDF)

Ann T. Tai , IA Tech, Inc.
Laura Pullum , Institute for Scienti.c Research, Inc.
Marjorie Darrah , Institute for Scienti.c Research, Inc.
Spiro T. Skias , Institute for Scienti.c Research, Inc.
Kam S. Tso , IA Tech, Inc.
pp. 281-282

Software Design Specification and Analysis Technique for the Safety Critical Software Based on Programmable Logic Controller (PLC) (PDF)

Poong Hyun Seong , Korea Advanced Institute of Science and Technology
Seo Ryong Koo , Korea Advanced Institute of Science and Technology
Sung Deok Cha , Korea Advanced Institute of Science and Technology
pp. 283-284

Development of a Verification Method for Timed Function Blocks Using ESDT and SMV (PDF)

Myung Jun Song , Korea Advanced Institute of Science and Technology
Poong Hyun Seong , Korea Advanced Institute of Science and Technology
Seo Ryong Koo , Korea Advanced Institute of Science and Technology
pp. 285-286

A Study of Automatic Code Generation for Safety-Critical Software: Preliminary Report (PDF)

Lazar Crawford , Embry Riddle Aeronautical University
Jared Erwin , Embry Riddle Aeronautical University
David P. Gluch , Embry Riddle Aeronautical University
Soma Mitra , Embry Riddle Aeronautical University
Andrew Kornecki , Embry Riddle Aeronautical University
Steafano Grimaldi , Embry Riddle Aeronautical University
pp. 287-288

A Formal Approach to Designing Secure Software Architectures (PDF)

Xudong He , Florida International University
Huiqun Yu , Florida International University
Yi Deng , Florida International University
Lian Mo , Florida International University
pp. 289-290
Session 3FA

Managing Secure Survivable Critical Infrastructures to Avoid Vulnerabilities (Abstract)

Andy Loebl , Oak Ridge National Laboratory
Tom Potok , Oak Ridge National Laboratory
Frederick Sheldon , Oak Ridge National Laboratory
Axel Krings , University of Idaho
Paul Oman , University of Idaho
pp. 293-296

Adding Assurance to Automatically Generated Code (Abstract)

Bernd Fischer , NASA Ames Research Center
Johann Schumann , NASA Ames Research Center
Ewen Denney , NASA Ames Research Center
pp. 297-299

A Rule-Based Component Customization Technique for QoS Properties (PDF)

Kendra Cooper , University of Texas at Dallas
I-Ling Yen , University of Texas at Dallas
Jia Zhou , University of Texas at Dallas
pp. 302-303

State Oriented Programming (PDF)

Hideki Nomoto , Massachusetts Institute of Technology
pp. 304-305

Towards Trusted Composition in Software Design (PDF)

Jing Dong , University of Texas at Dallas
Sheng Yang , University of Texas at Dallas
pp. 306-307

Automating the Failure Modes and Effects Analysis of Safety Critical Systems (PDF)

Christian Grante , Volvo Cars Corporation
David Parker , University of Hull
Yiannis Papadopoulos , University of Hull
pp. 310-311

Enhancing Testability in Architectural Design for the New Generation of Core-Based Embedded Systems (PDF)

Mehmet Sahinoglu , Troy State University Montgomery
Mansour H. Assaf , University of Ottawa
Emil M. Petriu , University of Ottawa
Sunil R. Das , University of Ottawa and Troy State University Montgomery
pp. 312-313
Author Index

Author Index (PDF)

pp. 314-315
105 ms
(Ver 3.1 (10032016))