10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems最新文献

筛选
英文 中文
Real-time data fusion technique for validation of an autonomous system 用于验证自治系统的实时数据融合技术
B. Cukic, Martin Mladenovski, Dejan Desovski, S. Yerramalla
{"title":"Real-time data fusion technique for validation of an autonomous system","authors":"B. Cukic, Martin Mladenovski, Dejan Desovski, S. Yerramalla","doi":"10.1109/WORDS.2005.48","DOIUrl":"https://doi.org/10.1109/WORDS.2005.48","url":null,"abstract":"We describe a data fusion technique suitable for use in validation of a real-time autonomous system. The technique is based on the Dempster-Shafer theory and Murphy's rule for beliefs combination. The methodology is applied for fusing the learning stability estimates, provided by an online neural network monitoring methodology, into a single probabilistic learning stability measure. The case study shows that our data fusion technique is capable of handing real-time requirements and provides unique, meaningful results for interpreting the stability information provided by the online monitoring system.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges for critical embedded systems 关键嵌入式系统面临的挑战
Helen Gill
{"title":"Challenges for critical embedded systems","authors":"Helen Gill","doi":"10.1109/WORDS.2005.21","DOIUrl":"https://doi.org/10.1109/WORDS.2005.21","url":null,"abstract":"Over the past decade, the area of embedded systems has begun to emerge as a discipline in its own right. The scope of research has expanded from the problem of programming small, resource-constrained, embedded electronic devices, to span development of a new generation of complex, distributed, real-time systems. This is driven by increases in the technological capability of information platforms. It is reasonable to predict that future engineered systems of all kinds will depend upon information technology to achieve highly information- and computation-enabled functionality and performance. The discipline of embedded systems, then, must be broadened to comprise the full range of IT for embedded sensing, computation, and system control services that will interact with, and regulate, the behavior of physical and engineered systems, many of which are life- or safety-critical.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Functional and non-functional properties in a family of embedded operating systems 嵌入式操作系统系列中的功能和非功能属性
D. Lohmann, Wolfgang Schröder-Preikschat, O. Spinczyk
{"title":"Functional and non-functional properties in a family of embedded operating systems","authors":"D. Lohmann, Wolfgang Schröder-Preikschat, O. Spinczyk","doi":"10.1109/WORDS.2005.37","DOIUrl":"https://doi.org/10.1109/WORDS.2005.37","url":null,"abstract":"The increasing complexity of embedded systems calls for software design and implementation techniques that support specialization without abandonment of reusability. This brings up a conflict as software specialized in supporting a very dedicated case usually cannot be (easily) reused for a different environment. Especially the \"standard software\" packets such as operating systems, e.g., are concerned with this problem. Particularly critical in this setting are non-functional properties that are ingredient parts of single components or crosscut in the extreme case the entire system software. These properties not only limit component reusability but also impair software maintenance in general. The paper deals with this issue in the scope of operating systems for the embedded-systems domain. It motivates using concepts such as family-based software design, feature modeling and aspect-oriented programming in order to come up with highly customizable and yet reusable system software solutions.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117199041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Deterministic scheduling for multithreaded replicas 多线程副本的确定性调度
Wenbing Zhao, L. Moser, P. Melliar-Smith
{"title":"Deterministic scheduling for multithreaded replicas","authors":"Wenbing Zhao, L. Moser, P. Melliar-Smith","doi":"10.1109/WORDS.2005.26","DOIUrl":"https://doi.org/10.1109/WORDS.2005.26","url":null,"abstract":"Replication of objects, processes and components is essential for building reliable distributed systems. However, maintaining replica consistency in the presence of nondeterminism is a challenge. There are many sources of nondeterminism in the applications being replicated. In this paper, we focus on the nondeterminism resulting from multithreading in the applications, and present a deterministic scheduling algorithm for ensuring consistent execution of replicated multithreaded applications.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121603643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Model-based integration of safety analysis and reliable software development 基于模型的安全分析与可靠软件开发的集成
M. D. Miguel, B. Pauly, Thierry Person, Javier Fernández Briones
{"title":"Model-based integration of safety analysis and reliable software development","authors":"M. D. Miguel, B. Pauly, Thierry Person, Javier Fernández Briones","doi":"10.1109/WORDS.2005.43","DOIUrl":"https://doi.org/10.1109/WORDS.2005.43","url":null,"abstract":"Software development of safety critical systems must combine the application of software developments techniques and safety analysis. The safety analyzers and software architects must have a common understanding of what makes a system safe, and what mitigation means improve the software component reliability and quality. Model driven development is an approach to reduce the gap between safety analysis technologies (e.g. FMECA and FTA) and software development languages (e.g. UML). Model driven technologies (e.g. metamodels and model transformation) give support for the integration of safety analysis concepts (e.g. risks, hazards and mitigation means) and software development concepts (e.g. components), and for the direct application of safety analysis on to software architectures.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A trustworthy Web services framework for business processes integration 用于业务流程集成的可靠Web服务框架
Stephen J. H. Yang, Blue C. W. Lan, Jen-Yao Chung
{"title":"A trustworthy Web services framework for business processes integration","authors":"Stephen J. H. Yang, Blue C. W. Lan, Jen-Yao Chung","doi":"10.1109/WORDS.2005.13","DOIUrl":"https://doi.org/10.1109/WORDS.2005.13","url":null,"abstract":"Web services can help business processes integration (BPI) in both flexible and efficient manner to fulfill dynamic business demands and trustworthiness becomes the critical concern for realizing the vision of such service-oriented enterprises. In this paper, we propose a trustworthy Web services framework for BPI to discuss various trustworthy issues from three different perspectives: structure, service and management. From structure perspective, we consider that the dependability of underlying data, applications and organizational policies are the basis of the trustworthiness of Web services based BPI. From service perspective, each involved actor in the business process model should be described by both functional and trustworthy capabilities so that business analysts could aggregate qualified Web services to fulfill the business goal. From management perspective, enterprises can perform the evaluation of quantifiable attributes of executed Web services to manage trust relationships among partners and customers. The proposed framework does not only assist enterprises perform Web services based BPI in a trustworthy way but also facilitate enterprises to develop trustworthy Web services.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A role-based access control policy verification framework for real-time systems 基于角色的实时系统访问控制策略验证框架
Basit Shafiq, A. Masood, J. Joshi, A. Ghafoor
{"title":"A role-based access control policy verification framework for real-time systems","authors":"Basit Shafiq, A. Masood, J. Joshi, A. Ghafoor","doi":"10.1109/WORDS.2005.11","DOIUrl":"https://doi.org/10.1109/WORDS.2005.11","url":null,"abstract":"This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The temporal and event-based semantics of these applications can be expressed using event-driven role based access control (RBAC) model. Any comprehensive access control model such as RBAC requires verification and validation mechanisms to ensure the consistency of access control specification. An inconsistent access control specification exposes the underlying system to numerous vulnerabilities and security risks. In this paper, we propose a Petri-net based framework for verifying the correctness of event-driven RBAC policies.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125944755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
A transformational overview of the core functionality of an abstract class loader for the SSP SSP抽象类装入器核心功能的转换概述
V. Winter, J. Beranek, A. Mametjanov, Fares Fraij, S. Roach
{"title":"A transformational overview of the core functionality of an abstract class loader for the SSP","authors":"V. Winter, J. Beranek, A. Mametjanov, Fares Fraij, S. Roach","doi":"10.1109/WORDS.2005.12","DOIUrl":"https://doi.org/10.1109/WORDS.2005.12","url":null,"abstract":"The SSP is a hardware implementation of a subset of the JVM for use in high consequence embedded applications. In this context, a majority of the activities belonging to class loading, as it is defined in the specification of the JVM, can be performed statically. Static class loading has the net result of dramatically simplifying the design of the SSP as well as increasing its performance. The functionality of the class loader can be implemented using strategic programming techniques. The incremental nature of strategic programming is amenable to formal verification. This article gives an overview of the core class loading activities for the SSP, their implementation in the strategic programming language TL, and outlines the approach to formal verification of the implementation.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework for middleware supporting real-time wide-area distributed computing 一个支持实时广域分布式计算的中间件框架
K. Kim, S. Jenks, L. Smarr, A. Chien, L. Zheng
{"title":"A framework for middleware supporting real-time wide-area distributed computing","authors":"K. Kim, S. Jenks, L. Smarr, A. Chien, L. Zheng","doi":"10.1109/WORDS.2005.5","DOIUrl":"https://doi.org/10.1109/WORDS.2005.5","url":null,"abstract":"The development of real-time systems that are distributed over a wide area is a significant problem that has challenged researchers for many years. Such systems require precise timing of actions throughout, but wide area networks tend to have variable delays that greatly reduce determinism. The framework described here supports the composition of wide-area real-time distributed virtual computer systems from deterministic components to provide precise timing from end-to-end. The framework use switched optical networks such as those being developed for the OptIPuter project for well-regulated long-distance paths yielding low jitter. Within campus networks, the time-triggered Ethernet technology provide deterministic switching of packets for real-time applications while supporting legacy IP traffic. Finally, at the edges, the time-triggered message-triggered object (TMO) support middleware manage resources to provide realtime operations while supporting an easy-to-program interface and high-level timing specification.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134388907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object-based commutativity analysis for real-time applications 实时应用的基于对象的交换性分析
John Eberhard, A. Tripathi
{"title":"Object-based commutativity analysis for real-time applications","authors":"John Eberhard, A. Tripathi","doi":"10.1109/WORDS.2005.44","DOIUrl":"https://doi.org/10.1109/WORDS.2005.44","url":null,"abstract":"The semantic specification of an object's methods can be used to determine their commutativity properties. The commutative method group, introduced in our earlier work, captures these commutativity properties in terms of groups of methods that commute, as opposed to pairs of methods. This paper outlines how method group commutativity can be used to increase concurrency in distributed and real-time applications. This paper presents the conceptual foundations of our analysis techniques for determining group commutativity. We show that our formal analysis techniques are able to derive a greater degree of commutativity when the semantics of object methods are weakened. This formal procedure is supported by the PVS theorem prover. Using a set of examples, we demonstrate the effectiveness of our approach in detecting increased commutativity when object semantics are weakened.","PeriodicalId":335355,"journal":{"name":"10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信