Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

This paper focuses on the following aspects of multifunction system testing: analysis of system requirements and revelation of atomic system functions and their relationships, analysis of input / output variables, analysis of system function groups (clusters), composition of the test sets for each group of atomic system functions. Related problems associated with these aspects are briefly described. Numerical and real world examples illustrate the proposed approach.

top of pageAUTHORS

Mark Sh. Levin Mark Sh. Levin

Bibliometrics: publication history
Publication years1993-2014
Publication count23
Citation Count50
Available for download0
Downloads (6 Weeks)0
Downloads (12 Months)0
Downloads (cumulative)0
Average downloads per article0.00
Average citations per article2.17
View colleagues of Mark Sh. Levin

Author image not provided  Mark Last

No contact information provided yet.

Bibliometrics: publication history
Publication years1993-2016
Publication count73
Citation Count409
Available for download8
Downloads (6 Weeks)85
Downloads (12 Months)795
Downloads (cumulative)9,670
Average downloads per article1,208.75
Average citations per article5.60
View colleagues of Mark Last

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

D.M. Buede, "Software review. Overview of MCDA software market," J. of Multi-Criteria Decision Analysis, vol. 1, no. 1, pp. 59-61, 1992.
M.G. Karpovsky, E.A. Moskalev, "Covering of edges of graph by aminimal set of paths," Discr. Math., vol. 58, no. 2, p. 214, 1986.
M. Last, A. Kandel, "Automated test reduction using an Info-Fuzzy Network, Annals of Software Engineering, Special Issues on Software Engineering with Artificial Intelligence," T.M. Khoshgoftaar (Ed.), Kluwer, pp. 235-258, 2003.
M.Sh. Levin, Combinatorial Engineering of Decomposable Systems, Kluwer Academic Publishers, Dordrecht, 1998.
M.Sh. Levin, M. Last, "Collection of test case sequences: Covering of function cluster digraph", IASTED Conf. on AI and Applications, Innsbruck, Febr. 2004 (accepted).
R. Paton, Software Testing. Sams Publishing, Indianapolis, IL, 2001.
L. Tamres, Introducing Testing Software, Addison-Wesley, Mass., 2002.

top of pageCITED BY

top of pageINDEX TERMS

Index Terms are not available

top of pagePUBLICATION

Title HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering table of contents
Pages 99-108
Publication Date2004-03-25 (yyyy-mm-dd)
Sponsors IEEE-CS Computer Society
NISTP National Institute for Systems Test and Productivity
IEEE-CS\TCDP TC on Distributed Processing
PublisherIEEE Computer Society Washington, DC, USA ©2004
ISBN: 0-7695-2094-4

top of pageREVIEWS

Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Table of Contents
Decomposition of fairness and performance aspects for high assurance continuous process-control systems
Dongfeng Wang, Hui Ma, Farokh B. Bastani, I-Ling Yen
Pages: 3-11

There are many applications that can be modeled as evolutions of continuous state spaces, such as real-time embedded systems, etc. For such applications, the divideand-conquer method is usually used to achieve high quality software development. Instead ...
Software fault tree analysis for product lines
Josh Dehlinger, Robyn R. Lutz
Pages: 12-21

The current development of high-integrity product lines threatens to outstrip existing tools for product-line verification. Software Fault Tree Analysis (SFTA) is a technique that has been used successfully to investigate contributing causes to potential ...
Flexible design of complex high-integrity systems using trade offs
lain Bate, Neil Audsley
Pages: 22-31

Large-scale complex embedded systems pose unique problems. To reduce overall development times, there is a need to develop the system in a concurrent fashion, involving the development and verification of software at the same time as designing, building ...
Multi-view modeling and analysis of embedded real-time software with meta-modeling and model transformation
Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Shin
Pages: 32-41

We present an end-to-end tool-chain for model-based design and analysis of component-based embedded realtime software, with Avionics Mission Computing as an application domain. The tool-chain covers the entire system development life-cycle including ...
Knowledge-centric and language independent framework for safety analysis tools
S. C. Kothari, Luke Bishop, Jeremias Sauceda, Gary Daugherty
Pages: 45-55

This paper presents a knowledge-centric and language independent framework and its application to develop safety analysis tools for avionics systems. A knowledge-centric approach is important to address domain-specific needs, with respect to the types ...
Reducing overfitting in genetic programming models for software quality classification
Yi Liu, Taghi Khoshgoftaar
Pages: 56-65

A high-assurance system is largely dependent on the quality of its underlying software. Software quality models can provide timely estimations of software quality, allowing the detection and correction of faults prior to operations. A software metrics-based ...
An approach for designing and assessing detectors for dependable component-based systems
Arshad Jhumka, Martin Hiller, Neeraj Suri
Pages: 69-78

In this paper, we present an approach that helps in the design and assessment of detectors. A detector is a program component that asserts the validity of a predicate in a given program state. We first develop a theory of error detection, and identify ...
Decentralized workload management for assurance according to heterogeneous service levels
Ivan Luque, Xiaodong Lu, Misato Tasaka, Kinji Mori, Yasushi Kuba
Pages: 79-88

Due to the advent of electronic commerce, the service provider can offer the customer a Service Level Agreement (SLA) to distinguish itself in today's competitive market. Different users require different levels of service in terms of information consumption ...
Structural analysis of explicit fault-tolerant programs
Stefan Gossens, Mario Dal Cin
Pages: 89-96

Explicit fault tolerant programs are characterized by proactive efforts to ensure robustness and ability of fault correction. A fault tolerant application is usually realized conforming to one of a collection of standard techniques. Graph based methods ...
Multi-function system testing: composition of test sets
Mark Sh. Levin, Mark Last
Pages: 99-108

This paper focuses on the following aspects of multifunction system testing: analysis of system requirements and revelation of atomic system functions and their relationships, analysis of input / output variables, analysis of system function groups (clusters), ...
Testing large scale streaming internet applications over wireless LANs
Praveen Ikkurthy, John Shahbazian, Miguel A. Labrador, Kenneth J. Christensen
Pages: 109-115

The amount of real-time traffic over the Internet as well as most corporate, government and academic IP networks is growing. Streaming applications are moving from purely entertainment to being essential for daily business and strategic operations. Examples ...
Knowledge management for computational intelligence systems
Rosina Weber, Duanqing Wu
Pages: 116-125

Computer systems do not learn from previous experiences unless they are designed for this purpose. Computational intelligence systems (CIS) are inherently capable of dealing with imprecise contexts, creating a new solution in each new execution. Therefore, ...
How good is your blind spot sampling policy
Tim Menzies, Justin S. Di Stefano
Pages: 129-138

Assessing software costs money and better assessment costs exponentially more money. Given finite budgets, assessment resources are typically skewed towards areas that are believed to be mission critical. This leaves blind spots: portions of the system ...
Assessing reliability risk using fault correction profiles
Norman F. Schneidewind
Pages: 139-148

Building on the concept of the fault correction profile -- a set of functions that predict fault correction events as a function of failure detection events -- introduced in previous research, we define and apply reliability risk metrics that are derived ...
Unsupervised learning for expert-based software quality estimation
Shi Zhong, Taghi M. Khoshgoftaar, Naeem Seliya
Pages: 149-155

Current software quality estimation models often involve using supervised learning methods to train a software quality classifier or a software fault prediction model. In such models, the dependent variable is a software quality measurement indicating ...
A method for solving trade-off among cost for owned/borrowed resource and loss of business chances
Tetsuya Masuishi, Kinji Mori
Pages: 156-163

This paper proposes a new problem for resource consumers who join resource-sharing communities to calculate how much resource to be owned from the view point of cost for owing and borrowing resource and loss of business chances. The consumers can borrow ...
The SSP: an example of high-assurance systems engineering
Gregory L. Wickstrom, Jared Davis, Steven E. Morrison, Steve Roach, Victor L. Winter
Pages: 167-177

The SSP is a high assurance systems engineering effort spanning both hardware and software. Extensive design review, first principle design, n-version programming, program transformation, verification, and consistency checking are the techniques used ...
Specification test coverage adequacy criteria = specification test generation inadequacy criteria
Mats P. E. Heimdahl, Devaraj George, Robert Weber
Pages: 178-186

The successful analysis technique model checking can be employed as a test-case generation technique to generate tests from formal models. When using a model checker for test case generation, we leverage the witness (or counterexample) generation capability ...
RUBASTEM: a method for testing VHDL behavioral models
Anneliese Andrews, Andrew O'Fallon, Tom Chen
Pages: 187-196

Verification of high-assurance system designs before they are fabricated on chips reduces time and money costs related to chip testing. Test benches, which are used in simulating and verifying VHDL designs, need to perform efficiently and effectively. ...
A formal specification-based approach to distributed parallel programming
Chia-Chu Chiang
Pages: 197-205

Low-level language constructs used for expressing explicit communication, concurrency, synchronization, and parallelism in systems make the systems difficult to maintain. For example, many programming languages allow programmers to create parallel processes ...
Software reliability estimation under certainty: generalization of the method of moments
Katerina Goševa-Popstojanova, Sunil Kamavaram
Pages: 209-218

Traditionally, reliability models of component-based software systems compute the point estimate of system reliability by plugging point estimates of unknown parameters into the model. These models discard the uncertainty of the parameters, that is, ...
EM algorithm for discrete software reliability models: a unified parameter estimation method
Hiroyuki Okamura, Atsushi Murayama, Tadashi Dohi
Pages: 219-228

In this paper, we consider the discrete software reliability models to assess the software reliability in discrete time circumstance, and develop a unified parameter estimation method based on the EM (Expectation-Maximization) principle. In numerical ...
Developing high-assurance secure systems with UML: a smartcard-based purchase protocol
Jan Jürjens
Pages: 231-240

Developing high-assurance security-critical systems is difficult and there are many well-known examples of security weaknesses exploited in practice. Thus a sound methodology supporting secure systems development is urgently needed. Our aim is to aid ...
Multiparty computation with full computation power and reduced overhead
Qingkai Ma, Wei Hao, I-Ling Yen, Farokh Bastani
Pages: 241-248

To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system can still be assured. All existing approaches incur high overhead. Some ...
Resource-sensitive intrusion detection models for network traffic
Taghi M. Khoshgoftaar, Mohamed E. Abushadi
Pages: 249-258

Network security has become an important issue in today's extensively interconnected computer world. The industry, academic institutions, small and large businesses and even residences have never been more at risk from the increasing onslaught of computer ...
Investigating the performance of genetic algorithm-based software test case generation
Donald J. Berndt, Alison Watkins
Pages: 261-262

Highly complex and interconnected systems may suffer from intermittent or transient failures that are particularly difficult to diagnose. This research focuses on the use of genetic algorithms for automatically generating large volumes of software test ...
Automated detection of injected faults in a differential equation solver
Mark Last, Menahem Friedman
Pages: 263-264

Analysis of logical relationships between inputs and outputs of a computational system can significantly reduce the test execution effort via minimizing the number of required test cases. Unfortunately, the available specification documents are often ...
Flow-service-quality (FSQ) engineering: foundations for high-assurance network systems development
Richard C. Linger, Alan R. Hevner, Gwendolyn Walton, Mark G. Pleszkoch
Pages: 265-266

High-assurance development of large-scale, networkcentric systems must address challenging engineering realities. Flow-Service-Quality (FSQ) engineering provides foundations and practices that accommodate these realities to maintain intellectual control ...
Function extraction (FX) technology: automated calculation of program behavior for high-assurance systems
Richard C. Linger, Mark G. Pleszkoch
Pages: 267-268

The function-theoretic view of programs suggests the possibility of automated calculation of program behavior. While significant theoretical challenges exist, the value of behavior calculation for high-assurance systems could be substantial.
Architectural overview of the computational intelligence testing tool
Thomas Barr
Pages: 269-270

The Computational Intelligence Tool, or CITool is a collection of black box test methodologies that allow the user to automatically generate test cases on any piece of software that can be described in terms of its inputs and outputs. This paper will ...
Evaluation of software development tools for high assurance safety critical systems
Andrew J. Komecki, Kimberley Hall, Darryl Hearn, Herman Lau, Janusz Zalewski
Pages: 273-274

This interim report describes investigation of leading software development tools used in development of aviation systems. It is a part of three-year effort with the ultimate objective to provide guidelines for a potential tool qualification. The hypothesis ...
Autonomous rating oriented agent allocation to achieve high response in demand-oriented information service system
Xiaodong Lu, Yi Zhou, Misato Tasaka, Ivan Luque, Kinji Mori, Ryuji Takanuki
Pages: 275-276

The efficient and reliable information service provision and utilization is an important infrastructure in the high-assurance information service system. In this paper, we introduce a rating oriented distributed information system sustained by push/pull ...
A tool for verification and validation of neural network based adaptive controllers for high assurance systems
Pramod Gupta, Johann Schumann
Pages: 277-278

High reliability of mission- and safety-critical software systems has been identified by NASA as a high-priority technology challenge. We present an approach for the performance analysis of a neural network (NN) in an advanced adaptive control system. ...
Combining testing and model checking for verification of high assurance systems
Dejan Desovski
Pages: 279-280

Proving the correctness of a developed specification with respect to the requirements is the most important and the most difficult task in the development of High Assurance Systems. Studies have shown that significant number of faults in real systems ...
Developing a data driven prognostic system with limited system information
Laura Pullum, Marjorie Darrah, Spiro T. Skias, Kam S. Tso, Ann T. Tai
Pages: 281-282
Software design specification and analysis technique for the safety critical software based on programmable logic controller (PLC)
Seo Ryong Koo, Poong Hyun Seong, Sung Deok Cha
Pages: 283-284

This paper introduces the software design specification and analysis technique for the safety-critical system based on Programmable Logic Controller (PLC). During software development phases, the design should perform an important role to connect between ...
Development of a verification method for timed function blocks using ESDT and SMV
Myung Jun Song, Seo Ryong Koo, Poong Hyun Seong
Pages: 285-286

As programmable logic controllers (PLCs) are widely used in the digital instrumentation and control (I&C) systems of nuclear power plants (NPPs), the safety of PLC software has become the most important consideration. In this work, we propose a method ...
A study of automatic code generation for safety-critical software: preliminary report
Lazar Crawford, Jared Erwin, Steafano Grimaldi, Soma Mitra, Andrew Kornecki, David P. Gluch
Pages: 287-288

Modern safety-critical systems (e.g., combined pacemaker/deliberator devices, distributed patient therapy delivery systems) incorporate more functionality than similar devices of the past. The development of these complex systems challenges existing ...
A formal approach to designing secure software architectures
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
Pages: 289-290

Software architecture plays a central role in developing software systems that provide basic functionality and satisfy critical properties such as reliability and security. However, little has been done to formally model software architectures and to ...
Managing secure survivable critical infrastructures to avoid vulnerabilities
Frederick Sheldon, Tom Potok, Andy Loebl, Axel Krings, Paul Oman
Pages: 293-296

Information systems now form the backbone of nearly every government and private system - from targeting weapons to conducting financial transactions. Increasingly these systems are networked together allowing for distributed operations, sharing of databases, ...
Adding assurance to automatically generated code
Ewen Denney, Bernd Fischer, Johann Schumann
Pages: 297-299

Code to estimate position and attitude of a spacecraft or aircraft belongs to the most safety-critical parts of flight software. The complex underlying mathematics and abundance of design details make it error-prone and reliable implementations costly. ...
KEEL technology applied to highly distributed loosely coupled systems
Tom Keeley
Pages: 300-301

Highly-distributed loosely-coupled systems are applied to complex systems when there is a need to insure that the systems continue to operate, even when portions of the system are disabled. The creation of loosely coupled systems involves a mechanism ...
A rule-based component customization technique for QoS properties
Jia Zhou, Kendra Cooper, I-Ling Yen
Pages: 302-303
State oriented programming
Hideki Nomoto
Pages: 304-305

This paper describes a methodology called "State Oriented Programming" to generate code from state-machine based formal design specification. The methodology is focused on the safety critical systems. In order to achieve highly reliable system development, ...
Towards trusted composition in software design
Jing Dong, Sheng Yang
Pages: 306-307

In this paper, we investigate the issues on software composition at the design level. A formal framework for component composition, replacement, refinement in software design is proposed. This framework can help software designers to design software ...
Analyze the worm-based attack in large scale P2P networks
Wei Yu
Pages: 308-309

Peer-to-Peer (P2P) computing has become an interesting research topic during recent years. In this paper, we address issue related to analyzing the worm-based attack in P2P systems. Particularly, our technologies include: 1) generic mathematical models ...
Automating the failure modes and effects analysis of safety critical systems
Yiannis Papadopoulos, David Parker, Christian Grante
Pages: 310-311
Enhancing testability in architectural design for the new generation of core-based embedded systems
Mansour H. Assaf, Sunil R. Das, Emil M. Petriu, Mehmet Sahinoglu
Pages: 312-313

This paper proposes testability enhancements in architectural design for embedded cores-based system-on-a-chip (SoC). There exist methods to ensure correct SoC functionality in both hardware and software, but one of the most reliable ways to realize ...

Powered by The ACM Guide to Computing Literature

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us