Jeffrey J. P. Tsai's research while affiliated with University of Illinois at Chicago and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (94)
In this paper, we present a conceptual framework and a system model for an intelligent assistant for requirement definition, KB/RMS. The requirement definition process is characterized by the Requirement Context Model. Informal and formal methods for requirement definition are considered in the light of this model, which serves as the logical schem...
Based on system execution traces, this paper presents a dynamic approach for visualizing and debugging timing constraint violations occurring in distributed real-time systems. The system execution traces used for visualization and debugging are collected during the execution of a target program in such a way that its run-time behavior is not interf...
Requirements analysis is a knowledge intensive task and it requires an expert to understand what the clients need. In this paper, we introduce a method which contains different artificial intelligence techniques to perform this task, and a prototype knowledge-based requirements analysis system, RAKES, is presented to explain our approach. In this a...
The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct large scale software systems. However, there is no formal architecture specification language available to model and analyze temporal properties of complex real-time systems. In this paper, an object-oriented logic-based architectu...
Despite the growing importance of multimedia applications, we still know relatively little about how to specify, design, and maintain this class of complex applications in a systematic manner. The concept of software architecture has recently emerged as a way to improve our ability to effectively construct and maintain large-scale complex software...
Research on real-time systems now focuses on formal approaches to specify and analyze the behavior of real-time systems. Temporal logic is a natural candidate for this since it can specify properties of event and state sequences. However, “pure” temporal logic cannot specify “quantitative” aspect of time. The concepts of eventuality, fairness, etc....
A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, and as sensor networks reach toward wide spread deployment, security becomes a major concern. In this regard, one needs to...
A formal requirements specification language plays an important role in software development. Not only can such language be used for stating requirements specification, but also can be used in many phases of software development life cycle. The FRORL project started from constructing a language with a solid logical foundation and further expanded t...
Trust is cast as a continuous re-evaluation: a system's reliability and security are scrutinized, not just prior to, but during its deployment. This approach to maintaining trust is specifically applied to distributed and embedded control systems. Unlike general purpose systems, distributed and embedded control systems, such as power grid control s...
Streszczenie. Cognitive informatics (CI) is the transdisciplinary enquiry of cognitive and informa-tion sciences that investigates into the internal information processing mechanisms and processes of the brain and natural intelligence, and their engineering applications via an interdisciplinary appro-ach. CI develops a coherent set of fundamental t...
Cognitive informatics (CI) is the transdisciplinary enquiry of cognitive and information sciences that investigates into the internal information processing mechanisms and processes of the brain and natural intelligence, and their engineering applications via an interdisciplinary approach. CI develops a coherent set of fundamental theories and deno...
A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, to name a few. As sensor networks reach towards wide spread deployment, security becomes a major concern. We need to be sur...
An intrusion detection system (IDS) is a security layer to detect ongoing intrusive activities in computer systems and networks. Current IDS have two main problems: The first problem is that typically so many alarms are generated as to overwhelm the system operator, many of these being false alarms. The second problem is that continuous tuning of t...
Some security protocols or mechanisms have been designed for wireless sensor networks (WSNs). However, an intrusion detection system (IDS) should always be deployed on security critical applications to defense in depth. Due to the resource constraints, the intrusion detection system for traditional network cannot be used directly in WSNs. Several s...
Machine learning deals with the issue of how to build programs that improve their performance at some task through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. They are particularly useful for (a) poorly understood problem domains where little knowledge exists for the humans...
As a recently emerging distributed computing paradigm, mobile-agent technology attracts great interests because of its salient merits. However, it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of primary importance. While protecting a platform (platform or host security) ca...
The 2005 IEEE International Conference on Cognitive Informatics (ICCI’05) was held during August 8th to 10th 2005 on the campus of University of California, Irvine. This was the fourth conference of ICCI [Kinsner et al. 05]. The previous conferences were held at Calgary, Canada (ICCI’02) [Wang et al. 02], London, UK (ICCI’03) [Patel et al. 03], and...
The 2005 IEEE International Conference on Cognitive Informatics (ICCI’05) was held during August 8th to 10th 2005 on the campus of University of California, Irvine. This was the fourth conference of ICCI [Kinsner et al. 05]. The previous conferences were held at Calgary, Canada (ICCI’02) [Wang et al. 02], London, UK (ICCI’03) [Patel et al. 03], and...
This article presents a hierarchical approach for detecting faults in wireless sensor networks (WSNs) after they have been deployed. The developers of WSNs can specify “invariants” that must be satisfied by the WSNs. We present a framework, ...
One of the main characteristics of open distributed embedded systems is that the involved entities are often very dynamic—different individual entities may join or leave the systems frequently. Therefore, systems built of these dynamic entities must be runtime reconfigurable. In addition, large classes of open embedded systems often have high avail...
An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine lea...
As a recently emerging distributed computing paradigm, mobile agent technology attracts great interests because of its salient merits. But it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of the primary importance. While protecting a platform (platform security or host secu...
This paper presents a coordination model that contains three active entities: actors, roles, and coordinators. Actors abstract the system's functionalities while roles and coordinators statically encapsulate coordination constraints and dynamically propagate these constraints among themselves and onto the actors. A software system's attack-toleranc...
IDSCA, an intelligent system, is developed for the direction selection of controller's action in a multiloop control system. In the design of a controller, the selections of both the valve type and the controller's action direction are important tasks, which directly affects the operation and safety of production. Traditional design can hardly solv...
In this chapter, we present the role-based context constrained access control (RBCC) model. The model integrates contextual constraints specified in first-order logic with the standard role-based access control (RBAC). In the RBCC access control model, the permission assignment functions are constrained by the user’s current accessing contexts. The...
Intrusion Detection System (IDS) detects ongoing intrusive activities in information systems. However, an IDS usually suffers
high false alarm especially in a dynamically changing environment, which forces continuous tuning on its detection model to
maintain sufficient performance. Currently, the manually tuning work greatly depends on the user to...
This paper presents a software architecture that ensures system dependability through external coordination. Under this architecture, a distributed system is decomposed into two types of entities, i.e., computational components and coordinators. The system's computational functionalities are carried out by computational components, whereas coordina...
Protein structure alignment is of importance in protein study. In general, such a task can be divided into two categories, i.e., global and local structure alignments. In this paper, one-dimensional features are extracted first from the original protein structures. A hybrid approach combining dynamic time warping and least squares adjustment is pro...
In this chapter, we present the role-based context constrained access control (RBCC) model. The model integrates contextual constraints specified in first-order logic with the standard role-based access control (RBAC). In the RBCC access control model, the permission assignment functions are constrained by the user's current accessing contexts. The...
Boosting is effective in improving the accuracy of a learner. In this paper, we present our research in developing a Multi-Class SLIPPER (MC-SLIPPER) system for intrusion detection from a boosting-based learning algorithm. Our system is built from multiple available binary SLIPPER modules. Multiple prediction-confidence based strategies are propose...
Security has become a major concern of software systems, especially distributed systems. The existence of various attacks should be considered in designing and developing those systems such that appropriate countermeasures could be applied. This chapter provides an overview of different types of possible attacks and countermeasures in the software...
System assembly is one of the major issues in engineering complex component-based systems. This is especially true when heterogeneous, COTS and GOTS distributed systems, typical in industrial applications, are involved. The goal of system assembly is not only to make constituent components work together, but also to ensure that the components as a...
Machine learning deals with the issue of how to build programs that improve their performance at some task through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. They are particularly useful for (a) poorly understood problem domains where little knowledge exists for the humans...
With the rapid growth of networking and high-computing power, the demand of larger and more complex software systems has increased dramatically. To deal with the complexity in designing large-scale complex software systems, the concept of component-based software design has gained popularity recently. However, in pursuing a component-based approach...
Contenido: Introducción; Técnicas de verificación para sistemas concurrentes; Sistemas de transición de etiqueta múltiple; Verificación compositiva usando MLTS; Verificación compositiva usando redes de Petri; Herramientas y experimentos; Retraso del tiempo en la redes de Petri y reducción neta.
This section presents a new net-reduction methodology to facilitate the analysis of real-time systems using Delay Time Petri
Nets (DTPNs). DTPNs are inspired by Merlin’s TPNs [Merlin & Faber, 1976], Sénac’s Hierarchical Time Stream Petri Nets (HTSPNs)
[Sénac et al, 1994, Sénac et al., 1996], and Little’s Timed Petri Nets [Little & Ghafoor, 1990, Li...
This chapter introduces a new model, namely multiset labeled transition systems (MLTSs in the sequel). MLTSs are closely related to labeled transition systems (LTSs for short) which are intensively used as a state-space model in the family of process algebras. There are three distinguished
characters between MLTSs and traditional LTSs. First, the l...
In this section, we give some examples to illustrate the practical use of our technique for different protocols and systems.
In addition, we compare our technique with five well known techniques for efficient analysis, i.e., Partial Order (PO), Bit-Hash (BH), Weak Bisimulation (WB), CFFD model reduction, and OBDD (Ordered Binary Decision Diagram).
Many techniques have been proposed to cope with state explosion. Equivalence is the main concept shared in most of the techniques.
Based on the concept of equivalence, it is possible to analyze a system model using another equivalent system model or state
space. For example, Petri-net models can be analyzed using reachability graphs because Petri N...
This section presents a new equivalence model for analyzing deadlock and livelock properties. We first define deadlock and
livelock properties and introduce basic notions of equivalences, synonyms,
and congruences.
Petri Nets have been widely recognized as a suitable tool for modeling and analyzing concurrent systems [Murata, 1989, Silva,
1989, Yoeli, 1987]. However because of the complexity of state explosion [Lipton, 1987], efficient analysis by reachability
graph is restricted to small system models. This section presents a Petri-net based methodology for...
Distance learning has become a very important mechanism for virtual university operation. In order to realize such an operation smoothly, it is necessary to consider distance learning from three perspectives: administration, awareness, and assessment. We are currently implementing a virtual university environment according to these guidelines. In t...
This paper presents a methodology to reduce the high analysis complexity in modeling and verifying high-assurance properties of safety-critical systems. Our new methodology includes a state-space construction mechanism, multiset labeled transition systems, two congruence theorems and a set of condensation rules for the analysis of deadlock states a...
We present a new net-reduction methodology to facilitate the
analysis of real-time systems using Delay Time Petri Nets (DTPNs). Net
reduction is one of the most important techniques for reducing the
state-explosion problem of Petri nets. However, the application of net
reduction to current timed-extensions of Petri nets (such as Merlin's
Time PNs)...
Rapid development of networks and communications makes security a more and more crucial problem. To provide... In this paper, we survey several security protocols and formal verification techniques to verify the protocols.
Distributed real-time systems have continually being developed for many real applications. It is very important to assure the reliability of such systems. However, developing a fault-free distributed real-time system is very difficult. Duplication is one of the fault-tolerant technologies for improving the reliability of distributed real-time compu...
With the rapid growth of network computing, the demand for large‐scale and complex software systems has increased dramatically.
However, the development of large‐scale and complex software systems is much more difficult and error prone. This is due to
the fact that techniques and tools for assuring the correctness and reliability of software system...
With the rapid growth of networking and high-computing power, the demand of larger and more complex software systems has increased dramatically. To deal with the complexity in designing large-scale complex software systems, the concept of component-based software design has gained popularity recently. However, in pursuing a component-based approach...
A variety of techniques and tools exist to parallelize software
systems on different parallel architectures (SIMD, MIMD). With the
advances in high-speed networks, there has been a dramatic increase in
the number of client/server applications. A variety of client/server
applications are deployed today, ranging from simple telnet sessions to
complex...
System monitoring collects information about the behavior of a computer system while the system is running. This article examines components and techniques for system monitoring, monitoring principles, workload selection, and implementation.
The sections in this article are
Developing and maintaining large-scale software systems is very expensive. The concept of software architecture has recently
emerged as a way to support the evolution of large-scale software systems. Several architecture description languages (ADLs)
have been proposed to support the specification of software architectures. However, current ADLs do...
Despite the growing importance of multimedia applications, we still know relatively little about how to specify, design and maintain this class of complex applications in a systematic manner. The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct and maintain large-scale complex softwa...
It is well known that undiscovered errors in a requirements specification is extremely expensive to be fixed when discovered in the software maintenance phase. Errors in the requirement phase can be reduced through the validation and verification of the requirements specification. Many logic-based requirements specification languages have been deve...
We present an incremental algorithm for model checking the red-time systems against the requirements specified in the real-time extension of modal mu-calculus. Using this algorithm, we avoid the repeated construction and analysis of the whole state-space during the course of evolution of the system from time to time. We use a finite representation...
The state-explosion problem of formal verification has obstructed its application to large-scale software systems. In this article, we introduce a set of new condensation theories: IOT-failure equivalence, IOT-state equivalence, and firing-dependence theory to cope with this problem. Our condensation theories are much weaker than current theories u...
In spite of advances in various transformation systems the
transformation of a nonmonotonic-logic-based requirements specification
into a procedural (imperative) language program has not been
investigated. This paper presents a logic-based transformation system
that can transform a nonmonotonic-logic-based specification, the
Frame-and-Rule Oriented...
The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct large-scale software systems. However, there is no formal architecture specification language available to model and analyze complex real-time systems. In this paper, an object-oriented logic-based architecture specification langua...
The concept of software architecture has recently emerged as a new way to improve our ability to effectively construct large scale software systems. This article presents a hybrid parallel evaluation model using a logic-based architecture specification language to speed up these processes. This model can preserve maximum parallelism while guarantee...
Timing analysis is essential to the development of valid computer systems especially for a distributed real-time system. We present both static and dynamic analysis procedures to verify timing properties of distributed real-time systems using timing constraint Petri nets (TCPNs). With both derived static information and collected dynamic data, we c...
The applications of real-time systems have dramatically increased over recent years. Requirements for real-time systems need to specify timing constraints. In this paper, we augment the FRORL requirements specification language with constructs specifically geared towards capturing requirements of real-time systems. We give meaning to these construc...
Distributed computing on workstation networks has gained immense momentum and researchers have found them useful even for super-computing applications. Despite the reliability problems, asynchronous communication is the popular choice for message transmissions among workstations. This choice is understandable because from the performance point of v...
Safety-critical systems are not only difficult to build, but also difficult to debug because they often have strict timing constraints and non-deterministic behavior. A correct and precise specification reduces the effort spent in testing and debugging the implemented system. This paper presents techniques of specification debugging and issues rela...
Current interactive software systems try to offer many features and a user-friendly interface to aid the user. However, where one system may suit one user, another user may find it difficult to use, because each user is different. User modeling techniques have been applied to make a system suitable for different users. This paper surveys research w...
This paper presents a distributed cooperative agents architecture for software development using a frame-and-rule oriented requirements language (FRORL). FRORL is a logic-based requirements specification language and serves as multiple roles for representing knowledge, for interface language between cooperative agents and knowledge and data bases,...
It is a paradigm of software engineering that a complete
representation of the problem domain (called requirement theory) is
repeatedly refined by correctness-preserving transformations into the
program itself. The design of a requirement theory has to allow for such
a design methodology. The authors argue that currently available
languages intende...
In this article, we present a knowledge-based system using the concept of knowledge representation and data abstraction to
support Ada software development. This article uses logic-based specification with object-oriented features to facilitate
Ada software development. The Ada source code will be obtained through knowledge-based transformation. Th...
In this paper, the knowledge representation of software component relations using non-monotonic logic to assist the validity and integrity checking of software information is presented. Software components and their interconnection information are represented by axioms. These axioms exhibit the structure and behaviour of the software system. Anothe...
In this article, we describe a new framework for designing real-time intelligent control systems. An integrated intelligent system is a large knowledge integration environment that consists of both symbolic reasoning systems (expert systems) and numerical computation packages. These modular software programs are controlled by a meta-system which ma...
In this article, we describe a new simulation method for engineer ing applications. The architec ture development is one of the most important techniques among the AI research tasks. An integrated intelligent simulation system is a large knowledge integration environment that consists of both symbolic reasoning systems (expert systems) and numerica...
A knowledge-based navigation system for autonomous land vehicles (ALVs) has been developed which can successfully negotiate an obstacle and threat-laden terrain, even if nothing is known beforehand about the terrain. The ALV stores new information in its memory as it travels, has the ability to backtrack out of unexpected dead ends, and performs sp...
In recent years it has been noticed that rapid prototyping produces better software products. Research on combining Artificial Intelligence and software engineering has also been conducted for a number of years. A knowledge-based system for rapid prototyping is presented. In the system, the Frame-and-Rule Oriented Requirements Language and a method...
A software system that uses the concepts of frames and production
rules to support software development using an integrated software
engineering paradigm is presented. This system includes a frame-and-rule
oriented requirements language (FRORL), a predominance/particular
methodology, and a knowledge base. FRORL uses frame representation for
object-...
In this article, we describe a new framework for developing real-time intelligent control systems. An integrated intelligent system is a large knowledge integration environment that consists of several symbolic reasoning systems (expert systems) and numerical computation packages. These software programs are controlled by a meta-system, which manag...
The authors describe an expert system, the Specification-Transformation Expert System (STES), which is to translate requirements specifications into design specifications automatically during the development phase of the software life cycle. STES accepts as input a software-requirements specification expressed in terms of dataflow diagrams. Using r...
An integrated life-cycle model is presented for use in a software
maintenance environment. The model represents information about the
development and maintenance of software systems, emphasizing
relationships between different phases of the software life cycle. It
provides the basis for automated tools to assist maintenance personnel
in making chan...
A knowledge-based system to support software design is presented.
The knowledge-based system consists of a frame-and-rule oriented
requirements language (FRORL), a knowledge base, an inference engine,
and a front-end dialogue system. The FRORL is developed to facilitate
the documentation and analysis of a software system. The software design
heuris...
We present an expert system that can handle various complicated decision-making problems of optimal control that are hardly solvable manually or even by computer-aided design techniques. The expert system is the first implementation of solving decision-making problems of optimal control using a computer, which paves the way for us to develop the re...
A new architecture for designing real-time intelligent control systems is developed, which consists of several symbolic reasoning systems, numerical computation routines and a meta-system to control the selection, operation and communication of these programs. The key issue to construct such an integrated intelligent system is to organize a meta-sy...
An approach is described that uses first-order logic for knowledge representation of software component interconnection information to facilitate the validity and integrity checking of the interconnection among software components during software development or modification. Directed graphs are used to model the structure and behavior of a large-sc...
Software design is the process which translates requirements into a detailed design representation of a software system. It is argued that good software design is the key to reliable and understandable software. Important techniques for software design, including architectural and detailed design stages, are surveyed. Recent advances in distributed...
Citations
... Basically there are three directions of agent protection: agent program protection, confidentiality of agent's execution and agent code hiding. For more details see [14]. ...
... This attack allows an attacker to deduce classified information from unclassified information. Here password or encryption key sniffing can do harm to system confidentiality [19]. Here attacker gain unauthorized access to system and steals legitimate user's password and masquerading as legitimate user or inspect encrypted files or communication messages by taking encryption keys illegally. ...
Reference: Security issues in Mobile Agents
... Using the Nash Equilibria allow us to model the above situation where attacker and defender need to take some decision. The Nash equilibrium has been used [10][5] to determine the best move of the two players, by considering the fix point of the interactions between attacker and defender. In this paper we first, used defense trees as extension of attack trees with countermeasures and economic quantitative indexes for modeling attack scenarios . ...
Reference: Strategic Games on Defense Trees
... The application of artificial intelligence techniques to software engineering (AI&SE) has produced some encouraging results (Binder and Tsai, 1992;Liu and Tsai, 1996;Lowry, 1992;Mostow, 1985;Partridge, 1998;Rich and Waters, 1986;Tsai and Weigert, 1993;Tsai et al., 1988;Welty and Selfridge, 1995). Some of the successful AI techniques include: knowledge-based approach, automated reasoning, expert systems, heuristic search strategies, temporal logic, planning, and pattern recognition. ...
Reference: Machine Learning and Software Engineering
... These four dimensions to BDA facilitate realtime data acquisition, transmission, storage and large-scale data-processing mechanisms, which ensure the right information is available for the right purpose at the right time to the right person [22,23,33,34]. � Intelligent simulation incorporates AI and other datadriven approaches to deliver an integrated simulation system that consists of both symbolic reasoning systems (expert systems) and numerical computation packages [35,36]. Through this integration, real-time data can be included and analysed in virtual models, so that engineers, operators and managers can test and optimize systems before implementing a physical changeover. ...
... Agent migration in code mobility involves two notions to allow the migration of mobile agents to and from mobile agent server: Weak Migration and Strong Migration [19]. ...
... As in controlling mobile robots, so in mapbuilding a traditional approach can be taken. The traditional approach either uses some kind of xed structure that is lled with information as it is obtained by sensory activities,see, for example, De Almeida 1989], Moravec 1988], Goto and Stentz 1987] or Tsai et al 1990]. We call these`self detailing schemes'. ...
... Dynamic Time Warping (DTW) was initially introduced to recognize spoken words [7]. Since then it has been used and proved useful in different applications such as: handwriting recognition [6,8], signature verification [9][10][11][12], fingers print verification [13], face recognition [14,15], speech and gesture recognition [16], protein structure [17], gene expression [18,19], chromosome classification [20], object detection and classification [21,22], curve matching [23,24] control system [25], image and shape matching [24,26] database and data mining [27-29, 31, 32, 34-37), brain activity classification [38], voice control [39] and so on. The DTW algorithm uses a dynamic programming technique to align time series with a given template so that a total distance measure is minimized [25]. ...
... However, only quite simple subsystems are evaluated or the possible set of validated properties is limited. Further analysis techniques involve data visualization tools [9,10] . These approaches have in common that situations have to be evaluated by the developer by looking through the given data, diagrams, or charts. ...
... Abstraction is a gifted capability of human beings. Abstraction is a basic cognitive process of the brain at the meta cognitive layer according to the Layered Reference Model of the Brain (LRMB) (Wang, 2003aWang, , 2007c Wang, Liu, & Wang, 2003). Only by abstraction can important theorems and laws about the objects under study be elicited and discovered from a great variety of phenomena and empirical observations in an area of inquiry. ...
Reference: The Cognitive Processes of Formal Inferences