B. Cukic, Martin Mladenovski, Dejan Desovski, S. Yerramalla
{"title":"Real-time data fusion technique for validation of an autonomous system","authors":"B. Cukic, Martin Mladenovski, Dejan Desovski, S. Yerramalla","doi":"10.1109/WORDS.2005.48","DOIUrl":"https://doi.org/10.1109/WORDS.2005.48","url":null,"abstract":"We describe a data fusion technique suitable for use in validation of a real-time autonomous system. The technique is based on the Dempster-Shafer theory and Murphy's rule for beliefs combination. The methodology is applied for fusing the learning stability estimates, provided by an online neural network monitoring methodology, into a single probabilistic learning stability measure. The case study shows that our data fusion technique is capable of handing real-time requirements and provides unique, meaningful results for interpreting the stability information provided by the online monitoring system.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges for critical embedded systems","authors":"Helen Gill","doi":"10.1109/WORDS.2005.21","DOIUrl":"https://doi.org/10.1109/WORDS.2005.21","url":null,"abstract":"Over the past decade, the area of embedded systems has begun to emerge as a discipline in its own right. The scope of research has expanded from the problem of programming small, resource-constrained, embedded electronic devices, to span development of a new generation of complex, distributed, real-time systems. This is driven by increases in the technological capability of information platforms. It is reasonable to predict that future engineered systems of all kinds will depend upon information technology to achieve highly information- and computation-enabled functionality and performance. The discipline of embedded systems, then, must be broadened to comprise the full range of IT for embedded sensing, computation, and system control services that will interact with, and regulate, the behavior of physical and engineered systems, many of which are life- or safety-critical.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Lohmann, Wolfgang Schröder-Preikschat, O. Spinczyk
{"title":"Functional and non-functional properties in a family of embedded operating systems","authors":"D. Lohmann, Wolfgang Schröder-Preikschat, O. Spinczyk","doi":"10.1109/WORDS.2005.37","DOIUrl":"https://doi.org/10.1109/WORDS.2005.37","url":null,"abstract":"The increasing complexity of embedded systems calls for software design and implementation techniques that support specialization without abandonment of reusability. This brings up a conflict as software specialized in supporting a very dedicated case usually cannot be (easily) reused for a different environment. Especially the \"standard software\" packets such as operating systems, e.g., are concerned with this problem. Particularly critical in this setting are non-functional properties that are ingredient parts of single components or crosscut in the extreme case the entire system software. These properties not only limit component reusability but also impair software maintenance in general. The paper deals with this issue in the scope of operating systems for the embedded-systems domain. It motivates using concepts such as family-based software design, feature modeling and aspect-oriented programming in order to come up with highly customizable and yet reusable system software solutions.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117199041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deterministic scheduling for multithreaded replicas","authors":"Wenbing Zhao, L. Moser, P. Melliar-Smith","doi":"10.1109/WORDS.2005.26","DOIUrl":"https://doi.org/10.1109/WORDS.2005.26","url":null,"abstract":"Replication of objects, processes and components is essential for building reliable distributed systems. However, maintaining replica consistency in the presence of nondeterminism is a challenge. There are many sources of nondeterminism in the applications being replicated. In this paper, we focus on the nondeterminism resulting from multithreading in the applications, and present a deterministic scheduling algorithm for ensuring consistent execution of replicated multithreaded applications.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121603643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. D. Miguel, B. Pauly, Thierry Person, Javier Fernández Briones
{"title":"Model-based integration of safety analysis and reliable software development","authors":"M. D. Miguel, B. Pauly, Thierry Person, Javier Fernández Briones","doi":"10.1109/WORDS.2005.43","DOIUrl":"https://doi.org/10.1109/WORDS.2005.43","url":null,"abstract":"Software development of safety critical systems must combine the application of software developments techniques and safety analysis. The safety analyzers and software architects must have a common understanding of what makes a system safe, and what mitigation means improve the software component reliability and quality. Model driven development is an approach to reduce the gap between safety analysis technologies (e.g. FMECA and FTA) and software development languages (e.g. UML). Model driven technologies (e.g. metamodels and model transformation) give support for the integration of safety analysis concepts (e.g. risks, hazards and mitigation means) and software development concepts (e.g. components), and for the direct application of safety analysis on to software architectures.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trustworthy Web services framework for business processes integration","authors":"Stephen J. H. Yang, Blue C. W. Lan, Jen-Yao Chung","doi":"10.1109/WORDS.2005.13","DOIUrl":"https://doi.org/10.1109/WORDS.2005.13","url":null,"abstract":"Web services can help business processes integration (BPI) in both flexible and efficient manner to fulfill dynamic business demands and trustworthiness becomes the critical concern for realizing the vision of such service-oriented enterprises. In this paper, we propose a trustworthy Web services framework for BPI to discuss various trustworthy issues from three different perspectives: structure, service and management. From structure perspective, we consider that the dependability of underlying data, applications and organizational policies are the basis of the trustworthiness of Web services based BPI. From service perspective, each involved actor in the business process model should be described by both functional and trustworthy capabilities so that business analysts could aggregate qualified Web services to fulfill the business goal. From management perspective, enterprises can perform the evaluation of quantifiable attributes of executed Web services to manage trust relationships among partners and customers. The proposed framework does not only assist enterprises perform Web services based BPI in a trustworthy way but also facilitate enterprises to develop trustworthy Web services.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A role-based access control policy verification framework for real-time systems","authors":"Basit Shafiq, A. Masood, J. Joshi, A. Ghafoor","doi":"10.1109/WORDS.2005.11","DOIUrl":"https://doi.org/10.1109/WORDS.2005.11","url":null,"abstract":"This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The temporal and event-based semantics of these applications can be expressed using event-driven role based access control (RBAC) model. Any comprehensive access control model such as RBAC requires verification and validation mechanisms to ensure the consistency of access control specification. An inconsistent access control specification exposes the underlying system to numerous vulnerabilities and security risks. In this paper, we propose a Petri-net based framework for verifying the correctness of event-driven RBAC policies.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125944755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Winter, J. Beranek, A. Mametjanov, Fares Fraij, S. Roach
{"title":"A transformational overview of the core functionality of an abstract class loader for the SSP","authors":"V. Winter, J. Beranek, A. Mametjanov, Fares Fraij, S. Roach","doi":"10.1109/WORDS.2005.12","DOIUrl":"https://doi.org/10.1109/WORDS.2005.12","url":null,"abstract":"The SSP is a hardware implementation of a subset of the JVM for use in high consequence embedded applications. In this context, a majority of the activities belonging to class loading, as it is defined in the specification of the JVM, can be performed statically. Static class loading has the net result of dramatically simplifying the design of the SSP as well as increasing its performance. The functionality of the class loader can be implemented using strategic programming techniques. The incremental nature of strategic programming is amenable to formal verification. This article gives an overview of the core class loading activities for the SSP, their implementation in the strategic programming language TL, and outlines the approach to formal verification of the implementation.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for middleware supporting real-time wide-area distributed computing","authors":"K. Kim, S. Jenks, L. Smarr, A. Chien, L. Zheng","doi":"10.1109/WORDS.2005.5","DOIUrl":"https://doi.org/10.1109/WORDS.2005.5","url":null,"abstract":"The development of real-time systems that are distributed over a wide area is a significant problem that has challenged researchers for many years. Such systems require precise timing of actions throughout, but wide area networks tend to have variable delays that greatly reduce determinism. The framework described here supports the composition of wide-area real-time distributed virtual computer systems from deterministic components to provide precise timing from end-to-end. The framework use switched optical networks such as those being developed for the OptIPuter project for well-regulated long-distance paths yielding low jitter. Within campus networks, the time-triggered Ethernet technology provide deterministic switching of packets for real-time applications while supporting legacy IP traffic. Finally, at the edges, the time-triggered message-triggered object (TMO) support middleware manage resources to provide realtime operations while supporting an easy-to-program interface and high-level timing specification.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134388907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object-based commutativity analysis for real-time applications","authors":"John Eberhard, A. Tripathi","doi":"10.1109/WORDS.2005.44","DOIUrl":"https://doi.org/10.1109/WORDS.2005.44","url":null,"abstract":"The semantic specification of an object's methods can be used to determine their commutativity properties. The commutative method group, introduced in our earlier work, captures these commutativity properties in terms of groups of methods that commute, as opposed to pairs of methods. This paper outlines how method group commutativity can be used to increase concurrency in distributed and real-time applications. This paper presents the conceptual foundations of our analysis techniques for determining group commutativity. We show that our formal analysis techniques are able to derive a greater degree of commutativity when the semantics of object methods are weakened. This formal procedure is supported by the PVS theorem prover. Using a set of examples, we demonstrate the effectiveness of our approach in detecting increased commutativity when object semantics are weakened.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}