Journal of Systems Architecture最新文献

筛选
英文 中文
A Comprehensive End-to-End Security Framework for Optical On-Chip Networks 光片上网络的综合端到端安全框架
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-17 DOI: 10.1016/j.sysarc.2025.103518
Uzmat Ul Nisa, Janibul Bashir
{"title":"A Comprehensive End-to-End Security Framework for Optical On-Chip Networks","authors":"Uzmat Ul Nisa,&nbsp;Janibul Bashir","doi":"10.1016/j.sysarc.2025.103518","DOIUrl":"10.1016/j.sysarc.2025.103518","url":null,"abstract":"<div><div>The Optical Network-on-Chip (ONoC) offers a promising solution to the challenges of scalability, high power consumption, and limited bandwidth inherent in current Electrical Network-on-Chip (ENoC) architectures. Despite its advantages, ONoC remains susceptible to various security threats, notably hardware Trojans (HTs). The insertion of an HT in any optical station can compromise the tuning circuits of microring resonators (MRs), enabling unauthorized manipulation of the data traversing the waveguides. Once compromised, these MRs can be exploited to intercept, alter, or even obstruct data transmission, thereby posing significant risks to the integrity, authenticity, and confidentiality of the communication. To mitigate such threats, various countermeasures can be employed. These include hardware-based authentication and encryption, physical tamper-proofing of the chip, and strict supply chain management to prevent the insertion of HTs during fabrication. Additionally, regular monitoring and auditing of the ONoC are crucial for detecting suspicious activities and implementing timely mitigation strategies. In this paper, we propose a comprehensive security framework designed to address these vulnerabilities at both the physical and application layers, effectively restricting the malicious activities of compromised MRs. At the physical layer, our approach leverages the deterministic power loss characteristics of ONoCs to identify abnormal MR behavior. Concurrently, at the application layer, we introduce a lightweight encryption scheme to secure inter-node communication, thereby preventing unauthorized access and data tampering within the ONoC. The evaluation showed acceptable area, power, and performance overheads, with an 18.2% increase in average packet latency and a 19.2% rise in the energy-delay (ED) product when integrated with state-of-the-art optical interconnects.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103518"},"PeriodicalIF":3.7,"publicationDate":"2025-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144655092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeMas: An efficient method for malicious samples detection and mitigation in cloud-based systems DeMas:在基于云的系统中检测和缓解恶意样本的有效方法
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-15 DOI: 10.1016/j.sysarc.2025.103519
Hengqi Guo , Shijing Hu , Xin Xu , Yusiyuan Chen , Weishen Lu , Baoqi Huang , Qiang Duan
{"title":"DeMas: An efficient method for malicious samples detection and mitigation in cloud-based systems","authors":"Hengqi Guo ,&nbsp;Shijing Hu ,&nbsp;Xin Xu ,&nbsp;Yusiyuan Chen ,&nbsp;Weishen Lu ,&nbsp;Baoqi Huang ,&nbsp;Qiang Duan","doi":"10.1016/j.sysarc.2025.103519","DOIUrl":"10.1016/j.sysarc.2025.103519","url":null,"abstract":"<div><div>Cloud services, particularly large-scale computing and data platforms, have become integral to enterprise operations, processing vast volumes of input data in real-time. However, these systems are increasingly vulnerable to adversarial actors who inject malicious data, thereby posing substantial security threats. Prevailing detection mechanisms often emphasize unintended class exclusions, which are inadequate in mitigating malicious attacks and are especially susceptible to class imbalance. To overcome these limitations, we introduce <strong>DeMas</strong>, a novel framework for the detection and mitigation of malicious samples. DeMas synergistically integrates adversarial perturbation with neighborhood averaging to robustly identify anomalous inputs. Furthermore, it employs a diffusion model, guided by a tractable probabilistic model, to remediate identified threats at the input level. This dual-stage approach transforms malicious samples into benign counterparts, thereby enhancing the security of downstream cloud-based models while preserving the usability of the data. Our empirical evaluation demonstrates that DeMas achieves a detection accuracy of 91.37% on a dataset of malicious samples, affirming its efficacy as a comprehensive defense strategy for secure and scalable cloud computing environments.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103519"},"PeriodicalIF":3.7,"publicationDate":"2025-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144670439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Repair friendly wide-stripe erasure coding for in-memory key–value stores 修复内存中键值存储的友好宽条擦除编码
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-14 DOI: 10.1016/j.sysarc.2025.103516
Xuzhe Liu, Yuchong Hu, Dan Feng, Leihua Qin, Hai Zhou, Xin Zhao, Renzhi Xiao
{"title":"Repair friendly wide-stripe erasure coding for in-memory key–value stores","authors":"Xuzhe Liu,&nbsp;Yuchong Hu,&nbsp;Dan Feng,&nbsp;Leihua Qin,&nbsp;Hai Zhou,&nbsp;Xin Zhao,&nbsp;Renzhi Xiao","doi":"10.1016/j.sysarc.2025.103516","DOIUrl":"10.1016/j.sysarc.2025.103516","url":null,"abstract":"<div><div>Erasure coding is a low-cost redundancy mechanism over replication for in-memory key–value stores by storing stripes of data and parity chunks. <em>Wide stripes</em> are recently proposed to suppress the fraction of parity chunks in a stripe for extreme storage savings. However, wide stripes aggravate the repair penalty, and existing repair-efficient approaches for erasure coding fail to address this effectively.</div><div>We investigate two representative approaches, locally repairable codes (LRCs) and regenerating codes (RGCs), which reduce repair overhead in distributed storage. Building on this foundation, we propose two systematic solutions to address the repair penalty in wide-stripe erasure coding: (i) <em>Combine Locality (CL)</em>, a cross-rack data placement mechanism for Azure-LRC combining parity and topological locality, (ii) <em>Repair-Contribution-Based Placement (RCBP)</em>, a cross-rack data placement mechanism for Hitchhiker codes (a subclass of RGCs), strategically co-locating chunks with high repair contributions in the same rack. We apply CL-based LRC and RCBP-based Hitchhiker codes to in-memory key–value (KV) stores, augmenting them with efficient encoding and update schemes. Experiments on Amazon EC2 show that CL reduces the single-chunk repair time by up to 90.5% compared to locality-based state-of-the-art. RCBP improves repair throughput by up to 19.3% and 44.6% compared to original Hitchhiker and RS codes, respectively.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103516"},"PeriodicalIF":3.7,"publicationDate":"2025-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144655093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blocking analysis of real-time tasks with parallel critical sections under federated scheduling 联合调度下具有并行临界区的实时任务阻塞分析
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-12 DOI: 10.1016/j.sysarc.2025.103517
Yang Wang , Xu Jiang , Nan Guan , Yi Wang
{"title":"Blocking analysis of real-time tasks with parallel critical sections under federated scheduling","authors":"Yang Wang ,&nbsp;Xu Jiang ,&nbsp;Nan Guan ,&nbsp;Yi Wang","doi":"10.1016/j.sysarc.2025.103517","DOIUrl":"10.1016/j.sysarc.2025.103517","url":null,"abstract":"<div><div>Locks are among the most common mechanisms for coordinating concurrent access to exclusive shared resources. Although extensive research has examined locking protocols and schedulability analysis for sequential real-time tasks, comparatively little attention has been paid to parallel tasks. Existing approaches commonly assume that critical sections must execute sequentially—an assumption maybe violated by realistic parallel programs. In this paper, we focus on the analysis of parallel real-time tasks containing parallel critical sections. We enhanced the locking protocols with new queue structure, new progress mechanism and propose novel analytical methods that accommodate both light (with density <span><math><mrow><mo>≤</mo><mn>1</mn></mrow></math></span>) and heavy tasks (with density <span><math><mrow><mo>&gt;</mo><mn>1</mn></mrow></math></span>), as opposed to approaches that exclusively target heavy tasks. We evaluate our techniques through comprehensive experiments, demonstrating that they improve upon existing methods by providing more accurate and efficient schedulability assessments.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103517"},"PeriodicalIF":3.7,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144631990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PQES: Post-quantum encryption and signature scheme based on FFT-accelerated polynomial ring lattice for IoT devices PQES:基于fft加速多项式环晶格的物联网设备后量子加密和签名方案
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-12 DOI: 10.1016/j.sysarc.2025.103515
Zexiang Zhang , Hong Rao , Shaoqing Jia , Huiling Feng , Shuanggen Liu
{"title":"PQES: Post-quantum encryption and signature scheme based on FFT-accelerated polynomial ring lattice for IoT devices","authors":"Zexiang Zhang ,&nbsp;Hong Rao ,&nbsp;Shaoqing Jia ,&nbsp;Huiling Feng ,&nbsp;Shuanggen Liu","doi":"10.1016/j.sysarc.2025.103515","DOIUrl":"10.1016/j.sysarc.2025.103515","url":null,"abstract":"<div><div>With the rapid advancement of quantum computing, traditional public-key cryptosystems (e.g., RSA and ECC) are facing severe threats from quantum attacks (e.g., Shor’s algorithm). To address the demand for efficient and secure communication in resource-constrained scenarios such as the Internet of Things (IoT), this paper proposes an integrated quantum-resistant encryption and signature scheme based on polynomial ring lattices and accelerated by the Fast Fourier Transform (FFT). The scheme combines the Ring Learning With Errors (Ring-LWE) and Ring-LWE-Short Integer Solution (Ring-SIS) problems, optimizing operations over the polynomial ring <span><math><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>q</mi></mrow></msub><mrow><mo>[</mo><mi>x</mi><mo>]</mo></mrow><mo>/</mo><mrow><mo>(</mo><msup><mrow><mi>x</mi></mrow><mrow><mi>N</mi></mrow></msup><mo>+</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> to significantly reduce key and ciphertext sizes. Additionally, FFT techniques are introduced to accelerate polynomial multiplication, while finite field FFT and floating-point error correction mechanisms address precision issues. Experimental results demonstrate that for polynomial degrees <span><math><mrow><mi>N</mi><mo>≥</mo><mn>1024</mn></mrow></math></span>, the encryption time is reduced by 23% compared to CRYSTALS-Kyber, with a 35% decrease in memory consumption. Moreover, Our signature verification mechanism demonstrates significantly lower resource consumption compared to both CRYSTALS-Dilithium and Falcon implementations under equivalent security parameters, making it suitable for low-overhead verification on edge devices and efficient signing on servers.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103515"},"PeriodicalIF":3.7,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144606132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved A* search: A bandwidth allocation algorithm for Linux traffic control based on Hierarchical Token Bucket 改进的A*搜索:基于分层令牌桶的Linux流量控制带宽分配算法
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-11 DOI: 10.1016/j.sysarc.2025.103461
Huiyao Xiao , Xi Jin , Zhiwei Feng , Qingxu Deng , Changqing Xia , Chi Xu
{"title":"Improved A* search: A bandwidth allocation algorithm for Linux traffic control based on Hierarchical Token Bucket","authors":"Huiyao Xiao ,&nbsp;Xi Jin ,&nbsp;Zhiwei Feng ,&nbsp;Qingxu Deng ,&nbsp;Changqing Xia ,&nbsp;Chi Xu","doi":"10.1016/j.sysarc.2025.103461","DOIUrl":"10.1016/j.sysarc.2025.103461","url":null,"abstract":"<div><div>Efficient bandwidth allocation is crucial for network performance. HTB (Hierarchical Token Bucket), a widely-used queue discipline in Linux traffic control, lacks theoretical guidance for parameter configuration. To address this, we formalize the bandwidth allocation problem under HTB as a Bandwidth Satisfaction Optimization (BSO) problem, proving its NP-hardness. We propose an improved A* algorithm that constructs a solution space tree, skips irrelevant parameters, and accelerates search through constraint relaxation and breadth limitation. Extensive evaluations show that our algorithm outperforms existing methods, achieving at least 90% of Gurobi’s effectiveness with significantly shorter execution time. Implementation on a real machine confirms that actual bandwidth usage matches the model’s calculated results, demonstrating the algorithm’s effectiveness and reliability in practical applications.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103461"},"PeriodicalIF":3.7,"publicationDate":"2025-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144606131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GHVSA: Graph-based high-dimensional vector search accelerator GHVSA:基于图的高维矢量搜索加速器
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-09 DOI: 10.1016/j.sysarc.2025.103514
Wei Yuan, Huawen Liang, Xi Jin
{"title":"GHVSA: Graph-based high-dimensional vector search accelerator","authors":"Wei Yuan,&nbsp;Huawen Liang,&nbsp;Xi Jin","doi":"10.1016/j.sysarc.2025.103514","DOIUrl":"10.1016/j.sysarc.2025.103514","url":null,"abstract":"<div><div>Graph-based high-dimensional vector search is the most common method for retrieval and achieves the best performance. However, implementing graph-based high-dimensional vector search in industrial applications requires reduced redundant computation, high accuracy, and low latency, which existing works fail to provide. We propose GHVSA, a graph-based vector search architecture that achieves low on-chip memory footprint and high energy efficiency by narrowing down the scope of vector search (about 0.5% of the entire dataset), avoiding redundant computation(more than 50% in the distance computation phase and more than 90% in the sorting phase) and data reuse. Extensive evaluations on three datasets show that GHVSA achieves an average of 609.07×, 53.6×, 5.16×, and 6.06× better energy efficiency than CPUs, GPUs, DF-GAS, and VStore, respectively.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103514"},"PeriodicalIF":3.7,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144596257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EdgeMark: An automation and benchmarking system for embedded artificial intelligence tools EdgeMark:嵌入式人工智能工具的自动化和基准测试系统
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-09 DOI: 10.1016/j.sysarc.2025.103488
Mohammad Amin Hasanpour , Mikkel Kirkegaard , Xenofon Fafoutis
{"title":"EdgeMark: An automation and benchmarking system for embedded artificial intelligence tools","authors":"Mohammad Amin Hasanpour ,&nbsp;Mikkel Kirkegaard ,&nbsp;Xenofon Fafoutis","doi":"10.1016/j.sysarc.2025.103488","DOIUrl":"10.1016/j.sysarc.2025.103488","url":null,"abstract":"<div><div>The integration of artificial intelligence (AI) into embedded devices, a paradigm known as embedded artificial intelligence (eAI) or tiny machine learning (TinyML), is transforming industries by enabling intelligent data processing at the edge. However, the many tools available in this domain leave researchers and developers wondering which one is best suited to their needs. This paper provides a review of existing eAI tools, highlighting their features, trade-offs, and limitations. Additionally, we introduce EdgeMark, an open-source automation system designed to streamline the workflow for deploying and benchmarking machine learning (ML) models on embedded platforms. EdgeMark simplifies model generation, optimization, conversion, and deployment while promoting modularity, reproducibility, and scalability. Experimental benchmarking results showcase the performance of widely used eAI tools, including TensorFlow Lite Micro (TFLM), Edge Impulse, Ekkono, and Renesas eAI Translator, across a wide range of models, revealing insights into their relative strengths and weaknesses. The findings provide guidance for researchers and developers in selecting the most suitable tools for specific application requirements, while EdgeMark lowers the barriers to adoption of eAI technologies.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103488"},"PeriodicalIF":3.7,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144632731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCED-H: An efficient scheduling policy for energy harvesting mixed-criticality real-time systems MCED-H:能量收集混合临界实时系统的高效调度策略
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-09 DOI: 10.1016/j.sysarc.2025.103505
Mostafa Tamimipour , Hakem Beitollahi , Maryline Chetto
{"title":"MCED-H: An efficient scheduling policy for energy harvesting mixed-criticality real-time systems","authors":"Mostafa Tamimipour ,&nbsp;Hakem Beitollahi ,&nbsp;Maryline Chetto","doi":"10.1016/j.sysarc.2025.103505","DOIUrl":"10.1016/j.sysarc.2025.103505","url":null,"abstract":"<div><div>Real-time systems traditionally rely on batteries, which have limited lifespans. Energy harvesting offers a sustainable alternative but introduces challenges due to the unpredictable nature of environmental energy sources. Integrating energy harvesting with mixed-criticality (MC) features further complicates system design. This paper presents the MCED-H algorithm, a novel approach for scheduling MC tasks in energy-constrained environments. MCED-H (Mixed-Criticality ED-H) is an enhanced scheduling algorithm based on ED-H, which itself is an extension of EDF for energy-harvesting systems, tailored specifically for mixed-criticality real-time applications. By employing virtual deadlines and adaptive mode switching, MCED-H effectively manages energy resources and ensures the timely completion of critical tasks. Experimental results demonstrate significant improvements in system reliability and energy efficiency compared to state-of-the-art techniques.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103505"},"PeriodicalIF":3.7,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144588013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reachability analysis of Hybrid Rebeca models 混合Rebeca模型的可达性分析
IF 3.7 2区 计算机科学
Journal of Systems Architecture Pub Date : 2025-07-08 DOI: 10.1016/j.sysarc.2025.103493
Fatemeh Ghassemi , Saeed Zhiany , Nesa Abbasi , Ali Hodaei , Ali Ataollahi , József Kovács , Erika Ábrahám , Marjan Sirjani
{"title":"Reachability analysis of Hybrid Rebeca models","authors":"Fatemeh Ghassemi ,&nbsp;Saeed Zhiany ,&nbsp;Nesa Abbasi ,&nbsp;Ali Hodaei ,&nbsp;Ali Ataollahi ,&nbsp;József Kovács ,&nbsp;Erika Ábrahám ,&nbsp;Marjan Sirjani","doi":"10.1016/j.sysarc.2025.103493","DOIUrl":"10.1016/j.sysarc.2025.103493","url":null,"abstract":"<div><div>Hybrid Rebeca is a modeling framework for asynchronous event-based cyber–physical systems (CPSs). In this work, we extend Hybrid Rebeca to allow the modeling of non-deterministic time behaviour. Besides the syntactical extension, we formalize the semantics of the extended language in terms of Timed Transition Systems, and adapt a reachability analysis algorithm originally designed for hybrid automata to be applicable to Hybrid Rebeca models. We prove the soundness of our approach and illustrate its applicability on two examples: a thermostat with alarm and a simplified brake-by-wire system with anti-lock braking system. We demonstrate that our dedicated algorithm is clearly superior to the alternative approach of transforming Hybrid Rebeca models to hybrid automata as an intermediate model and then applying the original reachability analysis method to these intermediate transformed models.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103493"},"PeriodicalIF":3.7,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144614119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信