mdh.sePublikasjoner
Endre søk
Begrens søket
123 101 - 112 of 112
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 101.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation AB, Sweden.
    Forsberg, Kristina
    Saab AB, Sweden.
    An Environment-Driven Ontological Approach to Requirements Elicitation for Safety-Critical Systems2015Inngår i: 23rd IEEE International Requirements Engineering Conference RE'15, 2015, s. 247-251Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The environment, where a safety critical system (SCS) operates, is an important source from which safety requirements of the SCS can originate. By treating the system under construction as a black box, the environment is typically documented as a number of assumptions, based on which a set of environmental safety requirements will be elicited. However, it is not a trivial task in practice to capture the environmental assumptions to elicit safety requirements. The lack of certain assumptions or too strict assumptions will either result in incomplete environmental safety requirements or waste many efforts on eliciting incorrect requirements. Moreover, the variety of operating environment for an SCS will further complicate the task, since the captured assumptions are at risk of invalidity, and consequently the elicited requirements need to be revisited to ensure safety has not been compromised by the change. This short paper presents an on-going work aiming to 1) systematically organize the knowledge of system operating environment and, 2) facilitate the elicitation of environmental safety requirements. We propose an ontological approach to achieve the objectives. In particular, we utilize conceptual ontologies to organize the environment knowledge in terms of relevant environment concepts, relations among them and axioms. Environmental assumptions are captured by instantiating the environment ontology. An ontological reasoning mechanism is also provided to support elicitation of safety requirements from the captured assumptions.

  • 102.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. IS (Embedded Systems).
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. IS (Embedded Systems).
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. IS (Embedded Systems).
    Provenzano, Luciana
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    An Ontological Approach to Hazard Identification for Safety-Critical Systems2017Inngår i: 2017 2nd International Conference on Reliability Systems Engineering, ICRSE 2017, Beijing, China, 2017, artikkel-id 8030746Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Hazard identification is an essential but very de- manding task for the development of safety-critical systems (SCSs). Current practices suffer from one or several drawbacks listed below: 1) a common hazard conceptualization is missing and thereby ambiguities may arise and, 2) there is still a need to formalize the experience of analysts and lessons learned from previous system development in a structured way to facilitate future reuse. and, 3) some hazard identification techniques require well-known system behaviors represented by models, such as automata and sequence diagrams, to identify hazards, and however such models are typically susceptible to changes or even not available in early stages. In this paper, we propose an ontological approach to support hazard identification in the early stages of the development of SCSs. The approach aims to improve hazard identification results in terms of completeness and unambiguity. A robotic strolling assistant system is used to evaluate the proposed approach.

  • 103.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    An Ontological Approach to Identify the Causes of Hazards for Safety-Critical Systems2017Inngår i: 2017 2nd International Conference on System Reliability and Safety ICSRS'17, 2017, s. 405-413Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Preliminary hazard analysis (PHA) is a key safety-concerned technique, applied in early stages of safety critical systems development, aiming to provide stakeholders with a general understanding of potential hazards together with their causes. Various studies have asserted that most significant flaws in hazard analysis techniques are related to the omission of causes associated with the identified hazards. In addition, identified causes are sometimes described in too generic terms to provide useful guidance for subsequent activities. In this paper, we propose an approach to explore and identify the causes associated with the hazards from a PHA, aiming to improve the results of hazard causes identification in terms of completeness and usefulness. To achieve the goal, the proposed approach utilizes the hazard-related concepts and relations defined in a hazard domain ontology presented in our previous work. Furthermore, an application scenario of a train control system is used to evaluate our approach.

  • 104.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Provenzano, Luciana
    Bombardier Transportation, Sweden.
    An Ontological Interpretation of the Hazard Concept for Safety-Critical Systems2017Inngår i: PROCEEDINGS OF THE 27TH EUROPEAN SAFETY AND RELIABILITY CONFERENCE (ESREL 2017), PORTOROZ , SLOVENIA, 18–22 JUNE 2017, 2017, s. 183-185Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The hazard concept has been extensively used in the literature and defined in an informal way, which serves as a guidance on identifying the potential hazards during the development of safety-critical systems. Intuitively, the definitions seem to be consistent and easy to understand. However, when we take a closer look at these definitions, ambiguities may arise, and real-world semantics need to be defined. In this work, we propose a hazard domain ontology, i.e., the Hazard Ontology (HO), to provide an ontological interpretation of hazard. To tackle the aforementioned issues, the HO is grounded in the Unified Foundational Ontology (UFO) to utilize the benefits provided by taking foundational concepts into account. Finally, we show some useful findings when we use the proposed ontology to analyze the hazard descriptions from an industrial passenger train project.

  • 105.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Johnsen, Andreas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Formal Execution Semantics for Asynchronous Constructs of AADL2013Inngår i: MODELS 2012 Innsbruck - Proceedings of the 5th International Workshop on Model Based Architecting and Construction of Embedded Systems, ACES-MB 2012, 2013, s. 43-48Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The Architecture Analysis and Design Language (AADL) has been widely accepted to support the development process of Distributed Real-time and Embedded (DRE) systems and ease the tension of analyzing the systems’ non-functional properties. The AADL standard prescribes the dispatching and scheduling semantics for the thread components in the system using natural language. The lack of formal semantics limits the possibility to perform formal verification of AADL specifications. The main contribution of this paper is a mapping from a substantial asynchronous subset of AADL into the TASM language, allowing us to perform resource consumption and schedulability analysis of AADL models. A small case study is presented as a validation of the usefulness of this work.

  • 106.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik.
    A Context-based Information Retrieval Technique for Recovering Use-Case-to-Source-Code Trace Links in Embedded Software Systems2013Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Post-requirements traceability is the ability to relate requirements (e.g., use cases) forward to corresponding design documents, source code and test cases by establishing trace links. This ability is becoming ever more crucial within embedded systems development, as a critical activity of testing, verification, validation and certification. However, semi-automatically or fullyautomatically generating accurate trace links remains an open research challenge, especially for legacy systems. Vector Space Model (VSM), a notably known Information Retrieval (IR) technique aims to remedy this situation. However, VSMÂ’s lowaccuracy level in practice is a limitation. The contribution of this paper is an improved VSM-based post-requirements traceability recovery approach using a novel context analysis. Specifically, the analysis method can better utilize context information extracted from use cases to discover relevant source code files. Our approach is evaluated by using three different embedded applications in the domains of industrial automation, automotive and mobile. The evaluation shows that our new approach can achieve better accuracy than VSM, in terms of higher values of three main IR metrics, i.e., recall, precision, and mean average precision, when it handles embedded software applications.

  • 107.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    A TASM-based requirements validation approach for safety-critical embedded systems2014Inngår i: 19th International Conference on Reliable Software Technologies, Ada-Europe 2014, 2014, s. 43-57Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Requirements validation is an essential activity to carry out in the system development life cycle, and it confirms the completeness and consistency of requirements through various levels. Model-based formal methods can provide a cost-effective solution to requirements validation in a wide range of domains such as safety-critical applications. In this paper, we extend a formal language Timed Abstract State Machine (TASM) with two newly defined constructs Event and Observer, and propose a novel requirements validation approach based on the extended TASM. Specifically, our approach can: 1) model both functional and non-functional (e.g. timing and resource consumption) requirements of the system at different levels and, 2) perform requirements validation by utilizing our developed toolset and a model checker. Finally, we demonstrate the applicability of our approach in real world usage through an industrial case study of a Brake-by-Wire system.

  • 108.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lu, Yue
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik.
    An Improved VSM-based Post-Requirements Traceability Recovery Approach Using Context Analysis2013Rapport (Annet vitenskapelig)
    Abstract [en]

    Automatically generating traceability links between software development artifacts existing throughout systems development life cycle, is becoming ever more important for requirements traceability. It remains an open software engineering challenge, especially for legacy systems, when the demand for minimizing human intervention is considered. The Vector Space Model (VSM), a notably known information retrieval technique, attempts to remedy the situation by reducing the required manual effort. One limitation of VSM is its low-level performance in practice, which can be improved by involving human intervention in the requirements traceability process earlier. The contribution of this paper is to present an improved VSM-based post/requirements traceability recovery approach by using a novel context analysis. This is done by firstly removing redundant information in the search space of the artifacts wrt a requirement, and then using both requirement and context queries to refine the results given by the standard VSM. In this way, the subsequent artifacts from the source requirement are more likely to be retrieved in the recovery process. Our approach is evaluated by using two chosen datasets (i.e., eTour and iTrust), of which results show that the proposed approach can achieve better performance in terms of discovering more true trace links and obtaining higher quality lists of traceability links than the standard VSM.

  • 109.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    The Observer-based Technique for Requirements Validation in Embedded Real-time Systems2014Inngår i: Proceedings of 1st International Workshop on Requirements Engineering and Testing (RET), 2014, s. 47-54Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Model-based requirements validation is an increasingly attractive approach to discovering hidden flaws in requirements in the early phases of systems development life cycle. The application of using traditional methods such as model checking for the validation purpose is limited by the growing complexity of embedded real-time systems (ERTS). The observer-based technique is a lightweight validation technique, which has shown its potential as a means of validating the correctness of model behaviors. In this paper, the novelty of our contributions is three-fold: 1) we formally define the observer constructs for our formal specification language namely the Timed Abstract State Machine (TASM) language and, 2) we propose the Events Monitoring Logic (EvML) to facilitate the observer specification and, 3) we show how to execute observers to validate the requirements describing the functional behaviors and non-functional properties (such as timing) of ERTS. We also illustrate the applicability of the extended TASM language through an industrial application of a Vehicle Locking-Unlocking system.

  • 110.
    Zhou, Jiale
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lönn, Henrik
    Volvo Group, Göteborg, Sweden.
    Karlsson, Daniel
    Volvo Group, Göteborg, Sweden.
    Liwång, Bo
    Swedish Radiation Safety Authority (SSM), Stockholm, Sweden.
    Towards Feature-Oriented Requirements Validation for Automotive Systems2014Inngår i: 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014 - Proceedings, 2014, s. 428-436Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In the modern automotive industry, feature models have been widely used as a domain-specific requirements model, which can capture commonality and variability of a software product line through a set of features. Product variants can thus be configured by selecting different sets of features from the feature model. For feature-oriented requirements validation, the variability of feature sets often makes the hidden flaws such as behavioral inconsistencies of features, hardly to avoid. In this paper, we present an approach to feature-oriented requirements validation for automotive systems w.r.t both functional behaviors and non-functional properties. Our approach first starts with the behavioral specification of features and the associated requirements by following a restricted use case modeling approach, and then formalizes such specifications by using a formal yet literate language for analysis. We demonstrate the applicability of our approach through an industrial application of a Vehicle Locking-Unlocking system

  • 111.
    Zimmerman, Marc
    et al.
    Massachusetts Institute of Technology, Cambridge, USA.
    Lundqvist, Kristina
    Massachusetts Institute of Technology, Cambridge, USA.
    Leveson, Nancy
    Massachusetts Institute of Technology, Cambridge, USA.
    Investigating the readability of state-based formal requirements specification languages2002Inngår i: Proc. 24th International Conference on Software Engineering ICSE02, 2002, s. 33-43, artikkel-id 7Konferansepaper (Annet vitenskapelig)
  • 112. Šurković, A.
    et al.
    Hanić, D.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Adnan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Wenslandt, D.
    Knightec AB, Västerås, Sweden.
    Falk, C.
    Knightec AB, Västerås, Sweden.
    Incorporating attacks modeling into safety process2018Inngår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag , 2018, Vol. 11094, s. 31-41Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Systems of systems (SoS) are built as a collection of systems capable of fulfilling their own function, as well as contributing to other functionalities. They are expected to increase production efficiency and possibly decrease human involvement in harmful environments, and in many cases such systems are safety-critical. For SoS it is a paramount to provide both safety and security assurance. It is not sufficient to analyze and provide assurance of these properties independently due to their mutual connection. Hence, a joint effort addressing safety and security that provides joint guarantees on both properties, is required. In this paper we provide a safety and security assurance argument by incorporating an adversary point of view, and identify potential failures coming from the security domain that might lead to an already identified set of hazards. In this way system assets, vulnerabilities and ways to exploit them can be assessed. As an outcome mitigation strategies coming from security considerations can be captured by the safety requirements. The approach is illustrated on an autonomous quarry.

123 101 - 112 of 112
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf