107 research outputs found

    Behavior models for software architecture

    Get PDF
    Monterey Phoenix (MP) is an approach to formal software system architecture specification based on behavior models. Architecture modeling focuses not only on the activities and interactions within the system, but also on the interactions between the system and its environment, providing an abstraction for interaction specification. The behavior of the system is defined as a set of events (event trace) with two basic relations: precedence and inclusion. The structure of possible event traces is specified using event grammars and other constraints organized into schemas. The separation of the interaction description from the components behavior is an essential MP feature. The schema framework is amenable to stepwise architecture refinement, reuse, composition, visualization, and multiple view extraction. The approach yields a basis for executable architecture specification supporting early testing and verification, systematic use case generation, and performance estimates with automated tools.Consortium for Robotics and Unmanned Systems Education and Research (CRUSER)Consortium for Robotics and Unmanned Systems Education and Research (CRUSER)Approved for public release; distribution is unlimited.Approved for public release; distribution is unlimited

    Visual Meta-Programming Notation

    Get PDF
    This paper describes a draft of visual notation for meta-programming. The main suggestions of this work include specialized data structures (lists, tuples, trees), data item associations that provide for creation of arbitrary graphs, visualization of data structures and data flows, graphical notation for pattern matching (list, tuple, and tree patterns, graphical notation for context free grammars, streams), encapsulation means for hierarchical rules design, two-dimensional data-flow diagrams for rules , visual control constructs for conditionals and iteration, default mapping rules to reduce real-estate requirements for diagrams, and dynamic data attributes. Two-dimensional data flow diagrams improve readability of a meta-program. The abstract syntax type definitions for common programming languages and related default mappings (parsing and de-parsing) provide for a practically feasible reuse of those components.U. S. Army Research Office40473-MA-S

    A Monitoring Language for Run Time and Post-Mortem Behavior Analysis and Visualization

    Get PDF
    UFO is a new implementation of FORMAN, a declarative monitoring language, in which rules are compiled into execution monitors that run on a virtual machine supported by the Alamo monitor architecture.Comment: In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/030902

    New Directions in Software Quality Assurance Automation

    Get PDF
    Abstract. A formalism is suggested for specifying environment behavior models for software test scenario generation based on attributed event grammars. The environment model may contain descriptions of the events triggered by the software outputs and of the hazardous states in which the system could arrive, thus providing a framework for specifying properties of software behavior within the given environment. The behavior of the system can be rendered as an event set with two partial ordering relations: precedence and inclusion (event trace). This formalism may be used as a basis for automation tools for test generation, test result monitoring and verification, for experiments to gather statistics about software safety, and for evaluating of dependencies of system's behavior on environment parameters. The monitoring activities can be implemented within a uniform framework as computations over event traces

    Trident Room Podcast Episode 26: Dr. Mikhail Auguston, Behavior is King [audio]

    Get PDF
    The Trident Room Podcast officially started broadcasting in the summer of 2020. It was created by an HSI/OR student who wanted to capture conversations he was having with the impressive array of faculty, students, and staff roaming the halls of NPS. Podcasting provides a direct and unfettered connection with listeners, and he wanted to bring that same kind of informative, yet intimate exchange to the Naval Postgraduate School community.The Trident Room Podcast host Michael Gannon sits down with Dr. Mikhail Auguston – they discuss Monterey Phoenix and the importance of behavior modeling. This episode was recorded on September 03, 2021

    Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP

    Get PDF
    The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security protocols are hard to design, even under the assumption of perfect cryptography. This is especially true when a protocol involves different timing aspects such as timestamps, timeout, delays and a set of timing constraints. In this paper, we propose a methodology for modeling and analyzing security protocols that are aware of timing aspects. We develop a formalism for modeling security protocols by extending Timed CSP with the capability of stating complicated timing behaviors for processes and events. A reasoning mechanism for the proposed formalism is developed based on Constraint Logic Programming (CLP). Using the reasoning engine built in CLP, the authentication properties of timed security protocols are able to be verified and attacks can be discovered. We demonstrate the capability of our method by modeling and verifying real-world security protocols. New approaches of using timing information to unfold and prevent potential attacks are also presented

    Environment Behavior Models for Scenario Generation and Testing Automation

    Get PDF
    In Proceedings of the First International Workshop on Advances in Model-Based Software Testing (A-MOST'05), the 27th International Conference on Software Engineering ICSE’05, May 15-16, 2005, St. Louis, USAThis paper suggests an approach to automatic scenario generation from environment models for testing of real-time reactive systems. The behavior of the system is defined as a set of events (event trace) with two basic relations: precedence and inclusion. The attributed event grammar (AEG) specifies possible event traces and provides a uniform approach for automatically generating, executing, and analyzing test cases. The environment model includes a description of hazardous states in which the system may arrive and makes it possible to gather statistics for system safety assessment. The approach is supported by a generator that creates test cases from the AEG models. We demonstrate the approach with case studies of prototypes for the safety-critical computer-assisted resuscitation algorithm (CARA) software for a casualty intravenous fluid infusion pump and the Paderborn Shuttle System

    Quality of Service Behavioral Model from Event Trace Analysis

    Get PDF
    Proc. of the 7th international Command and Control Research and Technology Symposium (CCRTS 2002), Quebec City, Canada, pp. 1-16.The distributed command & control environment includes limited computer resources and numerous mission critical applications competing for these scarce resources. Additionally the stringent constraints and considerable complexity of distributed command & control systems can create a condition that places extreme demands upon the allocated resources and invites a potential for program errors. Consistent quality of service distribution can be a critical element in ensuring effective overall program completion while avoiding potential errors and process failures. The potential for errors and process failures can be understood and addressed by performing a practical analysis of the resource deployment procedures utilized within this environment. However, analyzing resource-based quality of service within a distributed command & control environment is a demanding endeavor. This difficult task can be simplified by directly examining specific quality of service actions that take place during program execution. Therefore, topragmatically isolate these actions and develop a practical quality of service behavioral model, the research discussed in this paper has implemented an event trace approach to examine the exact quality of service execution path during program operation
    • …
    corecore