mdh.sePublikationer
Ändra sökning
Avgränsa sökresultatet
18192021 1001 - 1021 av 1021
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1001.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    A Hazard Domain Ontology for Preliminary Hazard Analysis in Reuse Scenarios2016Rapport (Övrigt vetenskapligt)
  • 1002.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    A Hazard Modeling Language for Safety-Critical Systems Based on the Hazard Ontology2017Ingår i: 43rd Euromicro Conference on Software Engineering and Advanced Applications SEAA'17, 2017, s. 301-304Konferensbidrag (Refereegranskat)
    Abstract [en]

    Preliminary hazard analysis (PHA) is a key safety-concerned activity, applied during the early stages of safety-critical systems development process, aiming to provide stakeholders with a general understanding of potential hazards. The identified hazards will be described and serve as a basis to further identify mitigation mechanisms in the subsequent development process. However, since various stakeholders will be involved in the identification process, a common understanding of the nature of hazards among stakeholders, such as what a hazard consists of and how to describe it without ambiguities, is of crucial importance to achieve the goal of PHA. In this work, we propose a hazard modeling language (HML) based on a hazard domain ontology, i.e., the Hazard Ontology, in order to facilitate the specification of identified hazards. In addition, we present an approach to the transformation from natural language hazard descriptions into the HML specification. Finally, an industrial PHA example is used to illustrate the usefulness of our work.

  • 1003.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation AB, Sweden.
    Forsberg, Kristina
    Saab AB, Sweden.
    An Environment-Driven Ontological Approach to Requirements Elicitation for Safety-Critical Systems2015Ingår i: 23rd IEEE International Requirements Engineering Conference RE'15, 2015, s. 247-251Konferensbidrag (Refereegranskat)
    Abstract [en]

    The environment, where a safety critical system (SCS) operates, is an important source from which safety requirements of the SCS can originate. By treating the system under construction as a black box, the environment is typically documented as a number of assumptions, based on which a set of environmental safety requirements will be elicited. However, it is not a trivial task in practice to capture the environmental assumptions to elicit safety requirements. The lack of certain assumptions or too strict assumptions will either result in incomplete environmental safety requirements or waste many efforts on eliciting incorrect requirements. Moreover, the variety of operating environment for an SCS will further complicate the task, since the captured assumptions are at risk of invalidity, and consequently the elicited requirements need to be revisited to ensure safety has not been compromised by the change. This short paper presents an on-going work aiming to 1) systematically organize the knowledge of system operating environment and, 2) facilitate the elicitation of environmental safety requirements. We propose an ontological approach to achieve the objectives. In particular, we utilize conceptual ontologies to organize the environment knowledge in terms of relevant environment concepts, relations among them and axioms. Environmental assumptions are captured by instantiating the environment ontology. An ontological reasoning mechanism is also provided to support elicitation of safety requirements from the captured assumptions.

  • 1004.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    An Ontological Approach to Identify the Causes of Hazards for Safety-Critical Systems2017Ingår i: 2017 2nd International Conference on System Reliability and Safety ICSRS'17, 2017, s. 405-413Konferensbidrag (Refereegranskat)
    Abstract [en]

    Preliminary hazard analysis (PHA) is a key safety-concerned technique, applied in early stages of safety critical systems development, aiming to provide stakeholders with a general understanding of potential hazards together with their causes. Various studies have asserted that most significant flaws in hazard analysis techniques are related to the omission of causes associated with the identified hazards. In addition, identified causes are sometimes described in too generic terms to provide useful guidance for subsequent activities. In this paper, we propose an approach to explore and identify the causes associated with the hazards from a PHA, aiming to improve the results of hazard causes identification in terms of completeness and usefulness. To achieve the goal, the proposed approach utilizes the hazard-related concepts and relations defined in a hazard domain ontology presented in our previous work. Furthermore, an application scenario of a train control system is used to evaluate our approach.

  • 1005.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation, Sweden.
    An Ontological Interpretation of the Hazard Concept for Safety-Critical Systems2017Ingår i: PROCEEDINGS OF THE 27TH EUROPEAN SAFETY AND RELIABILITY CONFERENCE (ESREL 2017), PORTOROZ , SLOVENIA, 18–22 JUNE 2017, 2017, s. 183-185Konferensbidrag (Refereegranskat)
    Abstract [en]

    The hazard concept has been extensively used in the literature and defined in an informal way, which serves as a guidance on identifying the potential hazards during the development of safety-critical systems. Intuitively, the definitions seem to be consistent and easy to understand. However, when we take a closer look at these definitions, ambiguities may arise, and real-world semantics need to be defined. In this work, we propose a hazard domain ontology, i.e., the Hazard Ontology (HO), to provide an ontological interpretation of hazard. To tackle the aforementioned issues, the HO is grounded in the Unified Foundational Ontology (UFO) to utilize the benefits provided by taking foundational concepts into account. Finally, we show some useful findings when we use the proposed ontology to analyze the hazard descriptions from an industrial passenger train project.

  • 1006.
    Zimmerman, Marc
    et al.
    Massachusetts Institute of Technology, Cambridge, USA.
    Lundqvist, Kristina
    Massachusetts Institute of Technology, Cambridge, USA.
    Leveson, Nancy
    Massachusetts Institute of Technology, Cambridge, USA.
    Investigating the readability of state-based formal requirements specification languages2002Ingår i: Proc. 24th International Conference on Software Engineering ICSE02, 2002, s. 33-43, artikel-id 7Konferensbidrag (Övrigt vetenskapligt)
  • 1007.
    Åberg, Christian
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Automated Deployment of Customer-Premises Equipment2016Självständigt arbete på grundnivå (yrkesexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Zero touch deployment tools perform installation and configuration of computer networking devices without human interaction. Modern zero touch deployment tools generally lack support for routers and are platform dependent. This forces Internet Service Providers to rely on manual node deployment methods when deploying Customer-Premise Equipment which is time consuming and error prone. This thesis investigates how the process of deploying Customer-Premises Equipment can be automated and optimized. State-of-the-art is discussed to point out requirements and possible improvements. Based on that, a tool is implemented performing deployment of Customer-Premises Equipment while minimizing manual intervention. As Internet Service Providers typically work with equipment from various vendors, multivendor support is implemented. This thesis studies common methods for initial Customer-Premises Equipment configuration. Request for Comments and Technical manuals are consulted regarding network protocols, zero touch deployment tools and router operating systems.

  • 1008.
    Åkerberg, Johan
    et al.
    ABB AB, Corporate Research, Sweden.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Exploring Network Security in PROFIsafe2009Ingår i: Lecture Notes In Computer Science: Proceedings of the 28th International Conference on Computer Safety, Reliability, and Security, Heidelberg: Springer-Verlag , 2009, s. 67-80Konferensbidrag (Refereegranskat)
    Abstract [en]

    Safety critical systems are used to reduce the probability of failure that could cause danger to person, equipment or environment. The increasing level of vertical and horizontal integration increases the security risks in automation. Since the risk of security attacks can not be treated as negligible anymore, there is a need to investigate possible security attacks on safety critical communication.

    In this paper we show that it is possible to attack PROFIsafe and change the safety-related process data without any of the safety measures in the protocol detecting the attack. As a countermeasure to network security attacks, the concept of security modules in combination with PROFIsafe will reduce the risk of security attacks, and is in line with the security concept defense-in-depth.

  • 1009.
    Åkerberg, Johan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Gidlund, Mikael
    Lennvall, Tomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Landernäs, Krister
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Design Challenges and Objectives in Industrial Wireless Sensor Networks2013Ingår i: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards / [ed] V. Çağrı Güngör, CRC Press, 2013Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 1010.
    Åkerblom, Jacob
    Mälardalens högskola, Akademin för innovation, design och teknik.
    UTVÄRDERING AV UTVALDA SD-WAN PRODUKTER2016Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna jämförelsestudie ämnar att undersöka marknadens leverantörer av nätverksutrustning de- finierade som Software Defined Wide Area Networks(SD-WAN). SD-WAN är en innovativ teknik som applicerar virtualisering och Software defined networking koncept i Wide Area Networks (WAN) för att skapa kostnadseffektiva nätverk. Studien har utförts på företaget Curitiba som idag arbetar med konsulttjänster inom utvalda WAN-optimering och SD-WAN-produkter. Arbetets syfte är att utvärdera SD-WAN-lösningar och specificera i vilken typ av företagsnätverk lösningen bäst appliceras. Undersökningen börjar med en utredning av dagens organisationsnätverk för att kunna utföra en jämförelse mot SD-WAN. Därefter utvärderas fem leverantörer av nätverksutrustning definierade som SD-WAN, dessa är: Cisco IWAN, CloudGenix, Riverbed Steelconnect, Talari och Viptela. Produkter från Viptela utvärderas i ett test som undersöker komplexiteten i konfiguration av produkten. Utöver SD-WAN jämförelsen undersöks dagens state of practice och vilka fördelar samt nackdelar denna har över SD-WAN. Cisco IWAN är en sammanslagning av Ciscos tidigare funktioner som tillammans bildar en komplett SD-WAN-lösning, för att uppnå detta behöver produkterna kompletteras med programvarulicenser. CloudGenix är en nystartad nätverksleverantör som erbjuder en SD-WAN-produkt som liknar många andra aktörer men utmärker sig med avancerad applikationsidentifikation. Riverbed SteelConnect är intressant för organisationer som söker en simplifierad helhetslösning med ett centraliserat gränssnitt. Talari var en av de första SDWAN-leverantörerna och fokuserar på applikationsprestanda och pålitlighet men saknar några av funktionerna som de andra aktörerna erbjuder. Viptela erbjuder en simplifierad SD-WAN-lösning med hög skalbarhet. SD-WAN som teknik har många spännande funktioner, organisationer som planerar att investera i en uppgradering av WAN-infrastruktur bör undersöka SD-WAN alternativ.

  • 1011.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Carlson, Jan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Fredriksson, Johan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Hansson, Hans
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Håkansson, John
    Uppsala University, Sweden.
    Möller, Anders
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Pettersson, Paul
    Uppsala University, Sweden.
    Tivoli, Massimo
    University of L'Aquila, Italy.
    The SAVE approach to component-based development of vehicular systems2007Ingår i: Journal of Systems and Software, ISSN 0164-1212, E-ISSN 1873-1228, Vol. 80, nr 5, s. 655-667Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The component-based strategy aims at managing complexity, shortening time-to-market, and reducing maintenance requirements by building systems with existing components. The full potential of this strategy has not yet been demonstrated for embedded software, mainly because of specific requirements in the domain, e.g., those related to timing, dependability, and resource consumption. We present SaveCCT - a component technology intended for vehicular systems, show the applicability of SaveCCT in the engineering process, and demonstrate its suitability for vehicular systems in an industrial case-study. Our experiments indicate that SaveCCT provides appropriate expressiveness, resource efficiency, analysis and verification support for component-based development of vehicular software. 

  • 1012.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Carlson, Jan
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Håkansson, John
    Uppsala University, Uppsala, Sweden.
    Hansson, Hans
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Sjödin, Mikael
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Nolte, Thomas
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Pettersson, Paul
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    The SaveCCM Language Reference Manual2007Rapport (Övrigt vetenskapligt)
    Abstract [en]

    This language reference describes the syntax and semantics of SaveCCM, a

    component modeling language for embedded systems designed with vehicle applications and safety concerns in focus. The SaveCCM component model was

    defined within the SAVE project. The SAVE components are influenced mainly

    by the Rubus component technology, with a switch concept similar to that

    in Koala. The semantics is defined by a transformation into timed automata

    with tasks, a formalism that explicitly models timing and real-time task scheduling.

    The purpose of this document is to describe a semantics of the SAVE component modeling language, which can be used to describe timing and functional behavior of components. The model of a system is in some cases an over approximation of the actual system behavior. An implementation of a model can resolve non-determinism e.g. by merging tasks or assigning a scheduling policy (such as static scheduling or fixed priority, preemptive or not) that will resolve

    the non-determinism.

  • 1013.
    Åkerholm, Mikael
    et al.
    Mälardalens högskola, Institutionen för datavetenskap och elektronik.
    Möller, Anders
    Hansson, Hans
    Nolin, Mikael
    Towards a Dependable Component Technology for Embedded System ApplicationsManuskript (Övrigt vetenskapligt)
  • 1014.
    Åsberg, Mikael
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Nolte, Thomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Kato, Shinpei
    Carnegie Mellon University, Department of Electrical and Computer Engineering, United States.
    A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux2011Ingår i: Proceedings - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011, 2011, s. 380-387Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a Hierarchical Scheduling Framework (HSF) recorder for Linux-based operating systems. The HSF-recorder is a loadable kernel module that is capable of recording tasks and servers without requiring any kernel modifications. Hence, it complies with the reliability and stability requirements in the area of embedded systems where proven versions of Linux are preferred. The recorder is built upon the loadable real-time scheduler framework RESCH (REal-time SCHed- uler). We evaluate our recorder by comparing the overhead of this solu- tion against two other recorders. Also, the tracing accuracy of the HSF- recorder is tested by running a media-processing task together with periodic real-time Linux tasks in combination with servers. We experiment with different task parameters and scheduling strategies and measure the performance of the media-processing task. The tests are recorded with the HSF-recorder, and the Ftrace recorder, in order to show the correctness of the experiments and the HSF-recorder itself.

  • 1015.
    Åsberg, Mikael
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Pettersson, Paul
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Nolte, Thomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Modelling, Verification and Synthesis of Two-Tier Hierarchical Fixed-Priority Preemptive Scheduling2011Ingår i: Proceedings - 23rd EUROMICRO Conference on Real-Time Systems (ECRTS'11), 2011, s. 172-181Konferensbidrag (Refereegranskat)
    Abstract [en]

    Hierarchical scheduling has major benefits when it comes to integrating hard real-time applications. One of those benefits is that it gives a clear runtime separation of applications in the time domain. This in turn gives a protection against timing error propagation in between applications. However, these benefits rely on the assumption that the scheduler itself schedules applications correctly according to the scheduling parameters and the chosen scheduling policy. A faulty scheduler can affect all applications in a negative way. Hence, being able to guarantee that the scheduler is correct is of great importance. Therefore, in this paper, we study how properties of hierarchical scheduling can be verified. We model a hierarchically scheduled system using task automata, and we conduct verification with model checking using the Times tool. Further, we generate C-code from the model and we execute the hierarchical scheduler in the Vx Works kernel. The CPU and memory overhead of the modelled scheduler is compared against an equivalent manually coded two-level hierarchical scheduler. We show that the worst-case memory consumption is similar and that there is a considerable difference in CPU overhead.

  • 1016.
    Åstrand, Elaine
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. Université Claude Bernard, Lyon, France.
    Wardak, Claire
    Université Claude Bernard, Lyon, France.
    Baraduc, Pierre
    Université Claude Bernard, Lyon, France.
    Ben Hamed, Suliann
    Université Claude Bernard, Lyon, France.
    Direct Two-Dimensional Access to the Spatial Location of Covert Attention in Macaque Prefrontal Cortex.2016Ingår i: Current Biology, ISSN 0960-9822, E-ISSN 1879-0445, Vol. 26, nr 13, s. 1699-1704Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Direct access to motor cortical information now enables tetraplegic patients to precisely control neuroprostheses and recover some autonomy. Incontrast, explicit access to higher cortical cognitive functions, such as covert attention, has been missing. Indeed, this cognitive information, known only to the subject, can solely be inferred by an observer from the subject's overt behavior. Here, we present direct two-dimensional real-time access to where monkeys are covertly paying attention, using machine-learning decoding methods applied to their ongoing prefrontal cortical activity. Decoded attention was highly predictive of overt behavior in a cued target-detection task. Indeed, monkeys had a higher probability of detecting a visual stimulus as the distance between decoded attention and stimulus location decreased. This was true whether the visual stimulus was presented at the cued target location or at another distractor location. In error trials, in which the animals failed to detect the cued target stimulus, both the locations of attention and visual cue were misencoded. This misencoding coincided with a specific state of the prefrontal cortical population in which the shared variability between its different neurons (or noise correlations) was high, even before trial onset. This observation strongly suggests a functional link between high noise-correlation states and attentional failure. Overall, this real-time access to the attentional spotlight, as well as the identification of a neural signature of attentional lapses, open new perspectives both to the study of the neural bases of attention and to the remediation or enhancement of the attentional function using neurofeedback.

  • 1017.
    Çürüklü, Baran
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lansner, Anders
    Configuration-specific facilitation phenomena explained by layer 2/3 summation pools in V12009Konferensbidrag (Refereegranskat)
  • 1018.
    Čaušević, Adnan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Appreciate the journey not the destination - Using video assignments in software testing education2018Ingår i: CEUR Workshop Proceedings, ISSN 1613-0073, E-ISSN 1613-0073, Vol. 2066, s. 4-7Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Courses related to software testing education, at the university level, in most cases have a learning outcome requiring from students to understand and apply a set of test design techniques upon completing the course. The problem, however, remains on how to both effectively and efficiently evaluate if a student has accomplished the stated outcome. By purely looking at the final resulting set of the test cases provided by a student, it is not evident which, if any, test design technique was used to derive them. In this paper, we are presenting a rather simple but effective method of collecting video assignment submissions from students instead of a traditional source code and tests solution. This way, the teacher could rather quickly and in detail gather evidence that student indeed obtained the knowledge needed for passing the stated learning outcome. 

  • 1019.
    Čaušević, Adnan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Land, Rikard
    Maximatecc AB, Västerås, Sweden.
    Sellin, Ola
    Bombardier Transportation, Väserås, Sweden.
    Automated Regression Test Generation Using Record & Replay Approach: A Case Study on Train Control Management System2016Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Organizations tend to limit their investment in test automation due to the lack of information on the actual tests reuse and when will automated tests really pay off. However, to perform efficient regression testing of software systems, it is expected from a development team to posses a certain level of test automation infrastructure in place, where at the minimum the test execution is scripted and automated. In this paper we are proposing the usage of record & replay approach to observe the functional usage of a component under test, while its being invoked as part of the whole system or only in a certain portion of it. Afterwords, executable tests are automatically derived, containing both test inputs and test verdict, allowing its later usage as part of a regression testing. With as minimal effort as one manual test execution, developers are provided with automated tests, minimizing any concerns on the investment in automation. A case study from Bombardier Transportation is provided showing how the proposed approach substantially reduced the test effort needed when performing regression testing of the train control management system for the Stockholm C30 metro train.

  • 1020.
    Šljivo, Irfan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Afshar, Sara
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Agent-centred Approach for Assuring Ethics in Dependable Service Systems2017Ingår i: 13th IEEE World Congress on Services SERVICES 2017, 2017, s. 51-58, artikel-id 8036721Konferensbidrag (Refereegranskat)
    Abstract [en]

    As the world enters the information era, more and more dependable services controlling and even making our decisions are moved to the ubiquitous smart devices. While various standards are in place to impose the societal ethical norms on decision-making of those devices, the rights of the individuals to satisfy their own moral norms are not addressed with the same scrutiny. Hence, the right of the individuals to reason on their own and evaluate morality of certain decisions is at stake, as many decisions are outsourced from the user to the service providers and third party stakeholders without the user's full awareness of all the aspects of those decisions. In this work we propose an agent-centred approach for assuring ethics in dependable technological service systems. We build upon assurance of safety and security and propose the notion of ethics assurance case as a way to assure that individual users have been made aware of all the ethically challenging decisions that might be performed or enabled by the service provider. We propose a framework for identifying and categorising ethically challenging decisions, and documenting the ethics assurance case. We apply the framework on an illustrative example.

  • 1021. Šurković, A.
    et al.
    Hanić, D.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Adnan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Wenslandt, D.
    Knightec AB, Västerås, Sweden.
    Falk, C.
    Knightec AB, Västerås, Sweden.
    Incorporating attacks modeling into safety process2018Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag , 2018, Vol. 11094, s. 31-41Konferensbidrag (Refereegranskat)
    Abstract [en]

    Systems of systems (SoS) are built as a collection of systems capable of fulfilling their own function, as well as contributing to other functionalities. They are expected to increase production efficiency and possibly decrease human involvement in harmful environments, and in many cases such systems are safety-critical. For SoS it is a paramount to provide both safety and security assurance. It is not sufficient to analyze and provide assurance of these properties independently due to their mutual connection. Hence, a joint effort addressing safety and security that provides joint guarantees on both properties, is required. In this paper we provide a safety and security assurance argument by incorporating an adversary point of view, and identify potential failures coming from the security domain that might lead to an already identified set of hazards. In this way system assets, vulnerabilities and ways to exploit them can be assessed. As an outcome mitigation strategies coming from security considerations can be captured by the safety requirements. The approach is illustrated on an autonomous quarry.

18192021 1001 - 1021 av 1021
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf