Jeffrey J. P. Tsai's research while affiliated with University of Illinois at Chicago and other places

Publications (94)

Article
In this paper, we present a conceptual framework and a system model for an intelligent assistant for requirement definition, KB/RMS. The requirement definition process is characterized by the Requirement Context Model. Informal and formal methods for requirement definition are considered in the light of this model, which serves as the logical schem...
Article
Based on system execution traces, this paper presents a dynamic approach for visualizing and debugging timing constraint violations occurring in distributed real-time systems. The system execution traces used for visualization and debugging are collected during the execution of a target program in such a way that its run-time behavior is not interf...
Article
Requirements analysis is a knowledge intensive task and it requires an expert to understand what the clients need. In this paper, we introduce a method which contains different artificial intelligence techniques to perform this task, and a prototype knowledge-based requirements analysis system, RAKES, is presented to explain our approach. In this a...
Article
The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct large scale software systems. However, there is no formal architecture specification language available to model and analyze temporal properties of complex real-time systems. In this paper, an object-oriented logic-based architectu...
Article
Despite the growing importance of multimedia applications, we still know relatively little about how to specify, design, and maintain this class of complex applications in a systematic manner. The concept of software architecture has recently emerged as a way to improve our ability to effectively construct and maintain large-scale complex software...
Article
Research on real-time systems now focuses on formal approaches to specify and analyze the behavior of real-time systems. Temporal logic is a natural candidate for this since it can specify properties of event and state sequences. However, “pure” temporal logic cannot specify “quantitative” aspect of time. The concepts of eventuality, fairness, etc....
Article
A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, and as sensor networks reach toward wide spread deployment, security becomes a major concern. In this regard, one needs to...
Article
A formal requirements specification language plays an important role in software development. Not only can such language be used for stating requirements specification, but also can be used in many phases of software development life cycle. The FRORL project started from constructing a language with a solid logical foundation and further expanded t...
Article
Trust is cast as a continuous re-evaluation: a system's reliability and security are scrutinized, not just prior to, but during its deployment. This approach to maintaining trust is specifically applied to distributed and embedded control systems. Unlike general purpose systems, distributed and embedded control systems, such as power grid control s...
Article
Full-text available
Streszczenie. Cognitive informatics (CI) is the transdisciplinary enquiry of cognitive and informa-tion sciences that investigates into the internal information processing mechanisms and processes of the brain and natural intelligence, and their engineering applications via an interdisciplinary appro-ach. CI develops a coherent set of fundamental t...
Article
Full-text available
Cognitive informatics (CI) is the transdisciplinary enquiry of cognitive and information sciences that investigates into the internal information processing mechanisms and processes of the brain and natural intelligence, and their engineering applications via an interdisciplinary approach. CI develops a coherent set of fundamental theories and deno...
Conference Paper
A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, to name a few. As sensor networks reach towards wide spread deployment, security becomes a major concern. We need to be sur...
Article
Full-text available
An intrusion detection system (IDS) is a security layer to detect ongoing intrusive activities in computer systems and networks. Current IDS have two main problems: The first problem is that typically so many alarms are generated as to overwhelm the system operator, many of these being false alarms. The second problem is that continuous tuning of t...
Conference Paper
Some security protocols or mechanisms have been designed for wireless sensor networks (WSNs). However, an intrusion detection system (IDS) should always be deployed on security critical applications to defense in depth. Due to the resource constraints, the intrusion detection system for traditional network cannot be used directly in WSNs. Several s...
Conference Paper
Machine learning deals with the issue of how to build programs that improve their performance at some task through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. They are particularly useful for (a) poorly understood problem domains where little knowledge exists for the humans...
Article
As a recently emerging distributed computing paradigm, mobile-agent technology attracts great interests because of its salient merits. However, it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of primary importance. While protecting a platform (platform or host security) ca...
Chapter
Full-text available
The 2005 IEEE International Conference on Cognitive Informatics (ICCI’05) was held during August 8th to 10th 2005 on the campus of University of California, Irvine. This was the fourth conference of ICCI [Kinsner et al. 05]. The previous conferences were held at Calgary, Canada (ICCI’02) [Wang et al. 02], London, UK (ICCI’03) [Patel et al. 03], and...
Chapter
The 2005 IEEE International Conference on Cognitive Informatics (ICCI’05) was held during August 8th to 10th 2005 on the campus of University of California, Irvine. This was the fourth conference of ICCI [Kinsner et al. 05]. The previous conferences were held at Calgary, Canada (ICCI’02) [Wang et al. 02], London, UK (ICCI’03) [Patel et al. 03], and...
Article
This article presents a hierarchical approach for detecting faults in wireless sensor networks (WSNs) after they have been deployed. The developers of WSNs can specify “invariants” that must be satisfied by the WSNs. We present a framework, ...
Article
One of the main characteristics of open distributed embedded systems is that the involved entities are often very dynamic—different individual entities may join or leave the systems frequently. Therefore, systems built of these dynamic entities must be runtime reconfigurable. In addition, large classes of open embedded systems often have high avail...
Article
Full-text available
An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine lea...
Article
As a recently emerging distributed computing paradigm, mobile agent technology attracts great interests because of its salient merits. But it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of the primary importance. While protecting a platform (platform security or host secu...
Article
Full-text available
This paper presents a coordination model that contains three active entities: actors, roles, and coordinators. Actors abstract the system's functionalities while roles and coordinators statically encapsulate coordination constraints and dynamically propagate these constraints among themselves and onto the actors. A software system's attack-toleranc...
Article
IDSCA, an intelligent system, is developed for the direction selection of controller's action in a multiloop control system. In the design of a controller, the selections of both the valve type and the controller's action direction are important tasks, which directly affects the operation and safety of production. Traditional design can hardly solv...
Chapter
In this chapter, we present the role-based context constrained access control (RBCC) model. The model integrates contextual constraints specified in first-order logic with the standard role-based access control (RBAC). In the RBCC access control model, the permission assignment functions are constrained by the user’s current accessing contexts. The...
Conference Paper
Intrusion Detection System (IDS) detects ongoing intrusive activities in information systems. However, an IDS usually suffers high false alarm especially in a dynamically changing environment, which forces continuous tuning on its detection model to maintain sufficient performance. Currently, the manually tuning work greatly depends on the user to...
Conference Paper
This paper presents a software architecture that ensures system dependability through external coordination. Under this architecture, a distributed system is decomposed into two types of entities, i.e., computational components and coordinators. The system's computational functionalities are carried out by computational components, whereas coordina...
Article
Protein structure alignment is of importance in protein study. In general, such a task can be divided into two categories, i.e., global and local structure alignments. In this paper, one-dimensional features are extracted first from the original protein structures. A hybrid approach combining dynamic time warping and least squares adjustment is pro...
Article
In this chapter, we present the role-based context constrained access control (RBCC) model. The model integrates contextual constraints specified in first-order logic with the standard role-based access control (RBAC). In the RBCC access control model, the permission assignment functions are constrained by the user's current accessing contexts. The...
Article
Boosting is effective in improving the accuracy of a learner. In this paper, we present our research in developing a Multi-Class SLIPPER (MC-SLIPPER) system for intrusion detection from a boosting-based learning algorithm. Our system is built from multiple available binary SLIPPER modules. Multiple prediction-confidence based strategies are propose...
Chapter
Security has become a major concern of software systems, especially distributed systems. The existence of various attacks should be considered in designing and developing those systems such that appropriate countermeasures could be applied. This chapter provides an overview of different types of possible attacks and countermeasures in the software...
Article
Full-text available
System assembly is one of the major issues in engineering complex component-based systems. This is especially true when heterogeneous, COTS and GOTS distributed systems, typical in industrial applications, are involved. The goal of system assembly is not only to make constituent components work together, but also to ensure that the components as a...
Article
Full-text available
Machine learning deals with the issue of how to build programs that improve their performance at some task through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. They are particularly useful for (a) poorly understood problem domains where little knowledge exists for the humans...
Conference Paper
With the rapid growth of networking and high-computing power, the demand of larger and more complex software systems has increased dramatically. To deal with the complexity in designing large-scale complex software systems, the concept of component-based software design has gained popularity recently. However, in pursuing a component-based approach...
Book
Contenido: Introducción; Técnicas de verificación para sistemas concurrentes; Sistemas de transición de etiqueta múltiple; Verificación compositiva usando MLTS; Verificación compositiva usando redes de Petri; Herramientas y experimentos; Retraso del tiempo en la redes de Petri y reducción neta.
Article
This section presents a new net-reduction methodology to facilitate the analysis of real-time systems using Delay Time Petri Nets (DTPNs). DTPNs are inspired by Merlin’s TPNs [Merlin & Faber, 1976], Sénac’s Hierarchical Time Stream Petri Nets (HTSPNs) [Sénac et al, 1994, Sénac et al., 1996], and Little’s Timed Petri Nets [Little & Ghafoor, 1990, Li...
Article
This chapter introduces a new model, namely multiset labeled transition systems (MLTSs in the sequel). MLTSs are closely related to labeled transition systems (LTSs for short) which are intensively used as a state-space model in the family of process algebras. There are three distinguished characters between MLTSs and traditional LTSs. First, the l...
Article
In this section, we give some examples to illustrate the practical use of our technique for different protocols and systems. In addition, we compare our technique with five well known techniques for efficient analysis, i.e., Partial Order (PO), Bit-Hash (BH), Weak Bisimulation (WB), CFFD model reduction, and OBDD (Ordered Binary Decision Diagram).
Article
Many techniques have been proposed to cope with state explosion. Equivalence is the main concept shared in most of the techniques. Based on the concept of equivalence, it is possible to analyze a system model using another equivalent system model or state space. For example, Petri-net models can be analyzed using reachability graphs because Petri N...
Article
This section presents a new equivalence model for analyzing deadlock and livelock properties. We first define deadlock and livelock properties and introduce basic notions of equivalences, synonyms, and congruences.
Article
Petri Nets have been widely recognized as a suitable tool for modeling and analyzing concurrent systems [Murata, 1989, Silva, 1989, Yoeli, 1987]. However because of the complexity of state explosion [Lipton, 1987], efficient analysis by reachability graph is restricted to small system models. This section presents a Petri-net based methodology for...
Article
Distance learning has become a very important mechanism for virtual university operation. In order to realize such an operation smoothly, it is necessary to consider distance learning from three perspectives: administration, awareness, and assessment. We are currently implementing a virtual university environment according to these guidelines. In t...
Article
This paper presents a methodology to reduce the high analysis complexity in modeling and verifying high-assurance properties of safety-critical systems. Our new methodology includes a state-space construction mechanism, multiset labeled transition systems, two congruence theorems and a set of condensation rules for the analysis of deadlock states a...
Article
We present a new net-reduction methodology to facilitate the analysis of real-time systems using Delay Time Petri Nets (DTPNs). Net reduction is one of the most important techniques for reducing the state-explosion problem of Petri nets. However, the application of net reduction to current timed-extensions of Petri nets (such as Merlin's Time PNs)...
Article
Rapid development of networks and communications makes security a more and more crucial problem. To provide... In this paper, we survey several security protocols and formal verification techniques to verify the protocols.
Article
Distributed real-time systems have continually being developed for many real applications. It is very important to assure the reliability of such systems. However, developing a fault-free distributed real-time system is very difficult. Duplication is one of the fault-tolerant technologies for improving the reliability of distributed real-time compu...
Article
With the rapid growth of network computing, the demand for large‐scale and complex software systems has increased dramatically. However, the development of large‐scale and complex software systems is much more difficult and error prone. This is due to the fact that techniques and tools for assuring the correctness and reliability of software system...
Article
With the rapid growth of networking and high-computing power, the demand of larger and more complex software systems has increased dramatically. To deal with the complexity in designing large-scale complex software systems, the concept of component-based software design has gained popularity recently. However, in pursuing a component-based approach...
Article
A variety of techniques and tools exist to parallelize software systems on different parallel architectures (SIMD, MIMD). With the advances in high-speed networks, there has been a dramatic increase in the number of client/server applications. A variety of client/server applications are deployed today, ranging from simple telnet sessions to complex...
Chapter
System monitoring collects information about the behavior of a computer system while the system is running. This article examines components and techniques for system monitoring, monitoring principles, workload selection, and implementation.
Article
Developing and maintaining large-scale software systems is very expensive. The concept of software architecture has recently emerged as a way to support the evolution of large-scale software systems. Several architecture description languages (ADLs) have been proposed to support the specification of software architectures. However, current ADLs do...
Conference Paper
Despite the growing importance of multimedia applications, we still know relatively little about how to specify, design and maintain this class of complex applications in a systematic manner. The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct and maintain large-scale complex softwa...
Article
Full-text available
It is well known that undiscovered errors in a requirements specification is extremely expensive to be fixed when discovered in the software maintenance phase. Errors in the requirement phase can be reduced through the validation and verification of the requirements specification. Many logic-based requirements specification languages have been deve...
Article
We present an incremental algorithm for model checking the red-time systems against the requirements specified in the real-time extension of modal mu-calculus. Using this algorithm, we avoid the repeated construction and analysis of the whole state-space during the course of evolution of the system from time to time. We use a finite representation...
Article
The state-explosion problem of formal verification has obstructed its application to large-scale software systems. In this article, we introduce a set of new condensation theories: IOT-failure equivalence, IOT-state equivalence, and firing-dependence theory to cope with this problem. Our condensation theories are much weaker than current theories u...
Article
In spite of advances in various transformation systems the transformation of a nonmonotonic-logic-based requirements specification into a procedural (imperative) language program has not been investigated. This paper presents a logic-based transformation system that can transform a nonmonotonic-logic-based specification, the Frame-and-Rule Oriented...
Conference Paper
The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct large-scale software systems. However, there is no formal architecture specification language available to model and analyze complex real-time systems. In this paper, an object-oriented logic-based architecture specification langua...
Article
The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct large scale software systems. This article presents a hybrid parallel evaluation model using a logic-based architecture specification language to speed up these processes. This model can preserve maximum parallelism while guarantee...
Conference Paper
Timing analysis is essential to the development of valid computer systems especially for a distributed real-time system. We present both static and dynamic analysis procedures to verify timing properties of distributed real-time systems using timing constraint Petri nets (TCPNs). With both derived static information and collected dynamic data, we c...
Article
The applications of real-time systems have dramatically increased over recent years. Requirements for real-time systems need to specify timing constraints. In this paper, we augment the FRORL requirements specification language with constructs specifically geared towards capturing requirements of real-time systems. We give meaning to these construc...
Article
Distributed computing on workstation networks has gained immense momentum and researchers have found them useful even for super-computing applications. Despite the reliability problems, asynchronous communication is the popular choice for message transmissions among workstations. This choice is understandable because from the performance point of v...
Article
Safety-critical systems are not only difficult to build, but also difficult to debug because they often have strict timing constraints and non-deterministic behavior. A correct and precise specification reduces the effort spent in testing and debugging the implemented system. This paper presents techniques of specification debugging and issues rela...
Article
Current interactive software systems try to offer many features and a user-friendly interface to aid the user. However, where one system may suit one user, another user may find it difficult to use, because each user is different. User modeling techniques have been applied to make a system suitable for different users. This paper surveys research w...
Conference Paper
This paper presents a distributed cooperative agents architecture for software development using a frame-and-rule oriented requirements language (FRORL). FRORL is a logic-based requirements specification language and serves as multiple roles for representing knowledge, for interface language between cooperative agents and knowledge and data bases,...
Article
It is a paradigm of software engineering that a complete representation of the problem domain (called requirement theory) is repeatedly refined by correctness-preserving transformations into the program itself. The design of a requirement theory has to allow for such a design methodology. The authors argue that currently available languages intende...
Article
In this article, we present a knowledge-based system using the concept of knowledge representation and data abstraction to support Ada software development. This article uses logic-based specification with object-oriented features to facilitate Ada software development. The Ada source code will be obtained through knowledge-based transformation. Th...
Article
In this paper, the knowledge representation of software component relations using non-monotonic logic to assist the validity and integrity checking of software information is presented. Software components and their interconnection information are represented by axioms. These axioms exhibit the structure and behaviour of the software system. Anothe...
Article
In this article, we describe a new framework for designing real-time intelligent control systems. An integrated intelligent system is a large knowledge integration environment that consists of both symbolic reasoning systems (expert systems) and numerical computation packages. These modular software programs are controlled by a meta-system which ma...
Article
In this article, we describe a new simulation method for engineer ing applications. The architec ture development is one of the most important techniques among the AI research tasks. An integrated intelligent simulation system is a large knowledge integration environment that consists of both symbolic reasoning systems (expert systems) and numerica...
Article
A knowledge-based navigation system for autonomous land vehicles (ALVs) has been developed which can successfully negotiate an obstacle and threat-laden terrain, even if nothing is known beforehand about the terrain. The ALV stores new information in its memory as it travels, has the ability to backtrack out of unexpected dead ends, and performs sp...
Article
In recent years it has been noticed that rapid prototyping produces better software products. Research on combining Artificial Intelligence and software engineering has also been conducted for a number of years. A knowledge-based system for rapid prototyping is presented. In the system, the Frame-and-Rule Oriented Requirements Language and a method...
Conference Paper
A software system that uses the concepts of frames and production rules to support software development using an integrated software engineering paradigm is presented. This system includes a frame-and-rule oriented requirements language (FRORL), a predominance/particular methodology, and a knowledge base. FRORL uses frame representation for object-...
Article
In this article, we describe a new framework for developing real-time intelligent control systems. An integrated intelligent system is a large knowledge integration environment that consists of several symbolic reasoning systems (expert systems) and numerical computation packages. These software programs are controlled by a meta-system, which manag...
Article
The authors describe an expert system, the Specification-Transformation Expert System (STES), which is to translate requirements specifications into design specifications automatically during the development phase of the software life cycle. STES accepts as input a software-requirements specification expressed in terms of dataflow diagrams. Using r...
Article
An integrated life-cycle model is presented for use in a software maintenance environment. The model represents information about the development and maintenance of software systems, emphasizing relationships between different phases of the software life cycle. It provides the basis for automated tools to assist maintenance personnel in making chan...
Article
A knowledge-based system to support software design is presented. The knowledge-based system consists of a frame-and-rule oriented requirements language (FRORL), a knowledge base, an inference engine, and a front-end dialogue system. The FRORL is developed to facilitate the documentation and analysis of a software system. The software design heuris...
Article
We present an expert system that can handle various complicated decision-making problems of optimal control that are hardly solvable manually or even by computer-aided design techniques. The expert system is the first implementation of solving decision-making problems of optimal control using a computer, which paves the way for us to develop the re...
Conference Paper
A new architecture for designing real-time intelligent control systems is developed, which consists of several symbolic reasoning systems, numerical computation routines and a meta-system to control the selection, operation and communication of these programs. The key issue to construct such an integrated intelligent system is to organize a meta-sy...
Article
An approach is described that uses first-order logic for knowledge representation of software component interconnection information to facilitate the validity and integrity checking of the interconnection among software components during software development or modification. Directed graphs are used to model the structure and behavior of a large-sc...
Article
Software design is the process which translates requirements into a detailed design representation of a software system. It is argued that good software design is the key to reliable and understandable software. Important techniques for software design, including architectural and detailed design stages, are surveyed. Recent advances in distributed...

Citations

... Basically there are three directions of agent protection: agent program protection, confidentiality of agent's execution and agent code hiding. For more details see [14]. ...
... This attack allows an attacker to deduce classified information from unclassified information. Here password or encryption key sniffing can do harm to system confidentiality [19]. Here attacker gain unauthorized access to system and steals legitimate user's password and masquerading as legitimate user or inspect encrypted files or communication messages by taking encryption keys illegally. ...
... Using the Nash Equilibria allow us to model the above situation where attacker and defender need to take some decision. The Nash equilibrium has been used [10][5] to determine the best move of the two players, by considering the fix point of the interactions between attacker and defender. In this paper we first, used defense trees as extension of attack trees with countermeasures and economic quantitative indexes for modeling attack scenarios . ...
... The application of artificial intelligence techniques to software engineering (AI&SE) has produced some encouraging results (Binder and Tsai, 1992;Liu and Tsai, 1996;Lowry, 1992;Mostow, 1985;Partridge, 1998;Rich and Waters, 1986;Tsai and Weigert, 1993;Tsai et al., 1988;Welty and Selfridge, 1995). Some of the successful AI techniques include: knowledge-based approach, automated reasoning, expert systems, heuristic search strategies, temporal logic, planning, and pattern recognition. ...
... These four dimensions to BDA facilitate realtime data acquisition, transmission, storage and large-scale data-processing mechanisms, which ensure the right information is available for the right purpose at the right time to the right person [22,23,33,34]. � Intelligent simulation incorporates AI and other datadriven approaches to deliver an integrated simulation system that consists of both symbolic reasoning systems (expert systems) and numerical computation packages [35,36]. Through this integration, real-time data can be included and analysed in virtual models, so that engineers, operators and managers can test and optimize systems before implementing a physical changeover. ...
... Agent migration in code mobility involves two notions to allow the migration of mobile agents to and from mobile agent server: Weak Migration and Strong Migration [19]. ...
... As in controlling mobile robots, so in mapbuilding a traditional approach can be taken. The traditional approach either uses some kind of xed structure that is lled with information as it is obtained by sensory activities,see, for example, De Almeida 1989], Moravec 1988], Goto and Stentz 1987] or Tsai et al 1990]. We call these`self detailing schemes'. ...
... Dynamic Time Warping (DTW) was initially introduced to recognize spoken words [7]. Since then it has been used and proved useful in different applications such as: handwriting recognition [6,8], signature verification [9][10][11][12], fingers print verification [13], face recognition [14,15], speech and gesture recognition [16], protein structure [17], gene expression [18,19], chromosome classification [20], object detection and classification [21,22], curve matching [23,24] control system [25], image and shape matching [24,26] database and data mining [27-29, 31, 32, 34-37), brain activity classification [38], voice control [39] and so on. The DTW algorithm uses a dynamic programming technique to align time series with a given template so that a total distance measure is minimized [25]. ...
... However, only quite simple subsystems are evaluated or the possible set of validated properties is limited. Further analysis techniques involve data visualization tools [9,10] . These approaches have in common that situations have to be evaluated by the developer by looking through the given data, diagrams, or charts. ...
... Abstraction is a gifted capability of human beings. Abstraction is a basic cognitive process of the brain at the meta cognitive layer according to the Layered Reference Model of the Brain (LRMB) (Wang, 2003aWang, , 2007c Wang, Liu, & Wang, 2003). Only by abstraction can important theorems and laws about the objects under study be elicited and discovered from a great variety of phenomena and empirical observations in an area of inquiry. ...