• 热门标签

当前位置: 主页 > 航空资料 > 国外资料 >

时间:2010-08-20 12:09来源:蓝天飞行翻译 作者:admin
曝光台 注意防骗 网曝天猫店富美金盛家居专营店坑蒙拐骗欺诈消费者

· evaluating the hazard identification method, software modelling framework and tools by using case studies.
A hazard identification methodology has been developed by generalising and grouping questions derived from an
analysis of over 300 incident/near miss reports provided by two major organisations (from two different industry
sectors). A computer support tool based on the methodology has been designed and implemented and several case
studies have been carried out. A conceptual framework for modelling software development processes has been
developed and a prototype software process modelling tool, ASPEN, has been implemented using knowledge-based
system technologies. The tool provides support for evaluating project process descriptions and for constructing
process models. The modelling framework and ASPEN were used to model part of the MOD’s defence standard 00-
56 (Safety Management Requirements for Defence Systems Containing Programmable Electronics).
For a more detailed description see A method for hazard assessment in programmable systems in Chapter 3 and
Modelling the process using AI techniques in Chapter 9.
References
[1] Hazard Identification in programmable systems: a methodology and case study, Broomfield, E.J. and P.W.H.
Chung, Applied Computing Review, 2, pp7-14, ACM Press, 1994.
[2] Using Incident Analysis to derive a methodology for assessing safety in programmable systems, Broomfield,
E.J and Chung, P.W.H, Achievement and Assurance of Safety, Ed Redmill and Anderson, Springer-Verlag
1995, ISBN 3-540-19922-5. pp223-239.
[3] Computer Hazard and Operability Studies, Chung, P. and Broomfield, E, in Computer Control and Human
Error, Chapter 2, Institution of Chemical Engineers, 1995, ISBN 085295 3623.
[4] A Framework for Modelling Software Development Processes, J.G. Doheny and I. M. Filby, in M. Bray, M.
Ross and G. Staples, editors, Proceedings of Software Quality Management IV, pages 533-545. Cambridge,
April 1996.
[5] Modelling Software Development Processes and Standards, J.G. Doheny and I. M. Filby, Proceedings of The
Software Quality Conference, Dundee, July 1996.
[6] The ASPEN Toolkit For Modelling And Assessing The Software Development Process, J.G. Doheny and I.
M. Filby, AUSDA project deliverable: D8, report no. AUSDA/AIAI/IR/5/1.0. - available from AIAI.
Project number: 9318 Approx. Project Cost: £0.2m Start date: May 1993 End date: Apr 1996
EPSRC Grant number: j18217, j18378
Advances in Safety Critical Systems - Results and Achievements from the DTI/EPSRC R&D Programme. Compiled and edited by Mike Falla.
4
BYLANDS Reverse engineering of real-time software
Computer Science, University of Durham
Uncles:
Durham Software Engineering
International Research and Development
Contact: Prof K Bennett
Computer Science, University of Durham
South Road
Durham, DH1 4QX
Tel: 0191 374 2630 Fax 0191 374 2560
Email: keith.bennett@durham.ac.uk
Summary
The fundamental problem that is addressed in this project is the reverse engineering of real-time process control
software, focusing particularly on timing and concurrency issues, thereby allowing its safety properties to be audited
and assessed more easily.
This project draws on previous work, conducted both at the University of Durham and at Durham Software
Engineering Ltd, (a) into the reverse engineering of existing code using formally proven semantic-preserving
program transformations on a wide spectrum language (WSL) and (b) recent theoretical work on the analysis of
real-time programs. Thus, the first aspect of the project has been to extend further these areas of work so as to
facilitate safety analysis.
A prerequisite for successful reverse engineering is a language or notation in which the results can be expressed, so
that it permits a "better" representation than the original code. The design of such a language is the second aspect of
the project.
For a more detailed description see: Reverse engineering safety critical systems in Chapter 10, and Reverse
engineering by formal transformations in Chapter 13.
References
[1] BYLANDS - Reverse Engineering Safety-Critical Systems, T.M. Bull, E.J. Younger, K.H. Bennett and Z.
Luo, Proc International Conference on Software Maintenance, Nice, France, 1995 (IEEE).
[2] Reverse Engineering Concurrent Programs using Formal Modelling and Analysis, E.J. Younger, Z. Luo, K.H.
Bennett and T.M. Bull, Proc. International Conference on Software Maintenance, Monterey Ca., 1996
(IEEE).
[3] Lego Proof Development System - User's Manual, Z. Luo and R. Pollack, Technical Report LFCS-92-211,
University of Edinburgh, 1992.
[4] System Safety through Formal Domain-Specific Languages, T.M. Bull and K.H. Bennett, Safety-critical
 
中国航空网 www.aero.cn
航空翻译 www.aviation.cn
本文链接地址:航空资料25(145)