The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we discuss the issue of balancing safety and security requirements in industrial automation and control systems. This is an area that requires careful attention. We propose a methodology/framework for addressing both safety and security for safety critical systems in industrial automation and control systems. Our concern is analyzing those vulnerabilities that when a threat agent is...
Unit testing(UT) is an important step in ensuring the quality of software. Considerable effort is spent in unit testing. There are several frameworks to help with UT. Some common frameworks are Cunit, Junit, Nunit etc. All of these have very similar capabilities. They provide capabilities for organizing and registering tests, registration of test initializers and finalizers, test execution and asserting...
For the interaction testing, there have been a variety of tools to efficiently generate test cases using Pair wise or In-Parameter-Order (or IPO) technique. Especially, PICT and AETG among these tools provide not only a combination technique of input parameters to generate test cases but also practical features to create feasible test cases in industry. Nonetheless, practicing these tools in industry...
Despite being staggeringly error prone, spreadsheets can be viewed as a highly flexible end-users programming environment. As a consequence, spreadsheets are widely adopted for decision making, and may have a serious economical impact for the business. Hence, approaches for aiding the process of pinpointing the faulty cells in a spreadsheet are of great value. We present a constrain-based approach,...
In this study, we propose a novel technique to generate the test data for COBOL programs using an SMT solver. The proposed technique can consider the comparison between a character string and a numerical value. The technique can also consider the significant figures for each variable. With the experiment, we confirmed that our technique can correctly generate test data for COBOL programs of a real...
In this paper, we propose the software quality evaluation method in evolution process using the change of software metrics. We used large scale telecommunication software embedded in the radio network system described by C/C++ language as target. As the result, we show that betweenness centralization and average distance of complex network metrics have impacts on fault densities in software evolutions...
The Communication Networks have been mainly used for transferring data/command among systems and to provide centralized display of data in control room of Nuclear Power Plants. Data Communication Protocols have evolved in terms of speed, reliability and safety significance. Computer Based Systems plays an important role in ensuring safety of NPPs, it is necessary to address performance related issues...
This article consists of a collection of slides from the author's PowerPoint conference presentation. A procedure and a statistical model to measure the risk of error when processing a workload X is proposed. It is concluded that architecting hazard-aware load balancer for Cloud SaaS can be promising.
This paper proposes a dynamic analysis approach developed for the verification of avionics software. The objective is to formally verify temporal properties on execution traces. The approach consists of three steps: computation of the necessary observation points in the program using static analysis, execution of the program and generation of the execution trace, verification of the temporal property...
This paper focuses on a sub-class of Dynamic Fault Trees (DFTs), called Priority Fault Trees (PFTs), containing only static Boolean logic gates and Priority-AND (PAND) gates. We present a transformation from a PAND gate to an AND gate with some dependent conditioning events, called CAND gate, provided that the dynamic behavior of the system can be modeled by a (semi-)Markov process. With the CAND...
Air Traffic Control (ATC) systems are typical software-intensive mission-critical systems with stringent dependability requirements. The major providers of ATC systems are system integrators that address such requirements at the cost of a very expensive testing effort. They envisage Model Driven Testing (MDT) as a promising approach to reduce this effort while achieving better product quality. Within...
Model based testing (MBT) techniques have been used extensively to enable automatic and systematic test data generation. Despite many success stories, MBT still suffers from the lack of a broader practical adoption. This paper reports on two experiences of applying MBT for test data generation in industrial contexts. We give our view on some of the reasons affecting MBT practical adoption, discuss...
Best in Class companies (both National and Global) continue to invest in safety systems; this in most cases is because safety is at the core of their production process and among their key performance metrics, closely linked to their productivity. Many unfortunate industrial accidents such as the recent explosion of the Deep Water Horizon with the largest marine oil spill in history are evidence of...
Software systems continuously running over a long time may suffer gradual performance degradation or failure rate increasing. This phenomenon, known as ¡®Software Aging', has become a great challenge to dependability-critical software systems. Researchers have made remarkable achievements in predicting resource exhaustion time and designing optimal rejuvenation plan. However, limited works focus on...
In this paper, rejuvenation is modeled in a redundant computer system in order to counteract software aging. The evolution of such a system in time could be modeled by a Markov or a semi-Markov process. Nevertheless, due to generally distributed repair times of system components, the entire system is non -- Markovian. Thus, Monte Carlo simulation methods are used for studying system's evolution in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.