Filters








129,616 Hits in 8.4 sec

Transactional memory for dependable embedded systems

Christof Fetzer, Pascal Felber
2011 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)  
Yet, we believe that in the context of dependable embedded systems the focus of TM should be on failure control and not concurrency control.  ...  Transactional Memory (TM) has been touted as one of the most promising approaches to concurrent programming for multi-core processors.  ...  ACKNOWLEDGMENT The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement 216852 (VELOX).  ... 
doi:10.1109/dsnw.2011.5958817 dblp:conf/dsn/FetzerF11 fatcat:mmihemmqyrdexjoc4bdc6e5plm

Synthesis of Fault Detection Mechanisms TRACK: Real-Time, Embedded and Physical Systems

Dominik Sojer
2011 2011 IEEE 35th Annual Computer Software and Applications Conference  
Model-driven software development is one possible solution to the problem of increasing code size and complexity in future safety-critical systems.  ...  This paper presents an approach for this synthesis which consists of three contributions: meta-models and modeltransformations for the generation and scheduling of fault detection mechanisms, a runtime  ...  FTOS [2] is a tool for the model-driven development of fault-tolerant real-time systems.  ... 
doi:10.1109/compsac.2011.108 dblp:conf/compsac/Sojer11 fatcat:chgfaf5fzvdllb3vbusc33bivy

An object-oriented simulation framework for real-time control of automated flexible manufacturing systems

Ali Yalcin, Ravi Kalyan Namballa
2005 Computers & industrial engineering  
The system resources are modeled as object classes based on the events that have to be monitored for real-time control.  ...  This paper describes an object-oriented simulation approach for the design of a flexible manufacturing system that allows the implementation of control logic during the system design phase.  ...  This is accomplished by using the simulation software package Arena Real-Time (System Modeling Corporation, 1999) , which advances the simulation of the control logic in real-time based on messages passed  ... 
doi:10.1016/j.cie.2004.07.010 fatcat:nubju7osuzfxzkilty7ha7djpm

Robustness of modular multi-layered software in the automotive domain: a wrapping-based approach

Caroline Lu, Jean-Charles Fabre, Marc-Olivier Killijian
2009 2009 IEEE Conference on Emerging Technologies & Factory Automation  
The risk of failure is increased with the possibility to multiplex software components with heterogeneous levels of criticality, observability.  ...  Instead, we consider a global wrapping-based approach to deal with multilevel properties to be checked on the complete multilayered system at runtime.  ...  However, we consider that addressing some real-time problems requires a global approach able to manage information through the fences of modularity and layers of abstraction at the same time, having the  ... 
doi:10.1109/etfa.2009.5347121 dblp:conf/etfa/LuFK09 fatcat:mxzysszb5vdwngjcihq2yq7n54

System integrity in small real-time computer systems

Thomas J. Harrison, Thomas J. Pierce
1973 Proceedings of the June 4-8, 1973, national computer conference and exposition on - AFIPS '73  
SYSTEM SOFTWARE CONSIDERATIONS In small real-time computers, it is important that the system software be extended beyond just the handling of errors detected by the hardware.  ...  Or, in the case when a programming error is detected, the user may want to load a new copy or version of all or part of his program from System Integrity in Small Real-Time Computer Systems 543 disk.  ... 
doi:10.1145/1499586.1499722 dblp:conf/afips/HarrisonP73 fatcat:p74peqdczffs3jjxz7htmm4you

Human-Error Prevention for Autonomous Edge Software Using Minimalistic Modern C++

Ryo Fukano, Masato Ishikawa
2019 Big Data and Cognitive Computing  
In science and engineering using edge-embedded software, it is necessary to demonstrate the validity of results; therefore, the software responsible for operating an edge system is required to guarantee  ...  The proposed approach was shown to be superior to conventional approaches that only rely on the attention of programmers to detect design defects.  ...  The mechanism enables to detect overlooked sampled-time filters to invoke an update law of a sampled-time filter using automatic operator generation, taking the filter class and the special invoking class  ... 
doi:10.3390/bdcc3040052 fatcat:qez2ierqkng2zlxx6m6gkv33ja

Field Testing of Software Applications [article]

Luca Gazzola
2017 arXiv   pre-print
When interacting with their software systems, users may have to deal with problems like crashes, failures, and program instability.  ...  An enormous number of diverse environments would then be available for testing, giving the possibility to run many test cases in many different situations, timely revealing the many failures that would  ...  Analysis of Field Failures To understand the characteristics of field failures, we focused on two main research questions: 1) What are the reasons why software faults are not detected at testing time?  ... 
arXiv:1705.07359v1 fatcat:agebl2m3irfljjvekldp5vvula

Deriving fault-detection mechanisms from safety requirements

Dominik Sojer, Christian Buckl, Alois Knoll
2011 Computer Science - Research and Development  
This is an important step to guarantee consistency and completeness in the critical transition from requirements engineering to software design, where a lot of errors can be introduced into a system by  ...  Safety requirements are an important artifact in the development of safety critical systems.  ...  The general goal is to analyze the propagation paths of failures in systems to get an understanding of the overall emergent failure behavior.  ... 
doi:10.1007/s00450-011-0203-z fatcat:5qa3cpchrjg3xhzohxvjhr4b4q

Managing Fault Monitoring and Recovery in Distributed Real-Time Control Systems [chapter]

Robert W. Brennan, Douglas H. Norrie
2002 Knowledge and Technology Integration in Production and Services  
In this paper we describe a holonic approach to managing distributed realtime control applications for manufacturing.  ...  The main feature of the architecture are layering (to support functional decomposition) and clustering (to support task propagation).  ...  Currently, we are working on a detailed approach to achieve dynamic and automatic reconfiguration of distributed real-time control systems (Zhang, 2001) .  ... 
doi:10.1007/978-0-387-35613-6_27 fatcat:3qjnj53edzdibp4loikrvxr3dq

A System Model of Fault Tolerance Technique in the Distributed and Scalable System: A Review

Deepika Dhawan, Dr Faiyaz Ahmad, Manish Madhava Tripathi
2022 International Journal of Innovative Research in Computer Science & Technology  
An appropriate fault detection technique can avoid a loss and save from system failure.  ...  The focus of this paper is on types of faults occurring in the system and fault detection techniques. A fault can occur in the system due to the link failure or for any other reason.  ...  Gordon-Ross, "Modeling and analysis of fault detection and fault tolerance in wireless sensor networks that in real-time distributed system if fault is not detected and recovered in time it result into  ... 
doi:10.55524/ijircst.2022.10.1.14 fatcat:ynoyz3ufinbrlcxciqw6lj7m3m

Fixing, preventing, and recovering from concurrency bugs

DongDong Deng, GuoLiang Jin, Marc de Kruijf, Ang Li, Ben Liblit, Shan Lu, ShanXiang Qi, JingLei Ren, Karthikeyan Sankaralingam, LinHai Song, YongWei Wu, MingXing Zhang (+2 others)
2015 Science China Information Sciences  
Concurrency bugs are becoming widespread with the emerging ubiquity of multicore processors and multithreaded software. They manifest during production runs and lead to severe losses.  ...  Many effective concurrency-bug detection tools have been built. However, the dependability of multi-threaded software does not improve until these bugs are handled statically or dynamically.  ...  The state-of-the-art for concurrency-bug failure recovery is the checkpoint-and-rollback approach [39] [40] [41] . At run time, this approach periodically takes system checkpoints.  ... 
doi:10.1007/s11432-015-5315-9 fatcat:qx6mwxqhazaoror6whqhbauoi4

Development of the Prototype IP-Solar: A Web-based Monitoring and Diagnostics Tool for Solar Thermal Systems

Christian Holter, Bernhard Gerardts, Philip Ohnewein, Angela Dröscher, Franz Feichtner, Klaus Schgaguler, Ernst Meißner, Peter Luidolt, Alice Köstinger, Richard Heimrath, Wolfgang Streicher
2012 Energy Procedia  
The only cost-effective way for permanent surveillance of LSTS operation is to make use of a computer-aided tool that performs as many steps as possible in an automated mode.  ...  In particular, the algorithm-based approach, its implementation and testing are described in detail.  ...  An exciting aspect is the fact that the basic methodology of IP-Solar is easily extendable to smaller plants and to other scopes of application where automatic monitoring and failure detection are important  ... 
doi:10.1016/j.egypro.2012.11.017 fatcat:abv7cszn5zcgnhxg3ssvjxmfq4

An online evolutionary approach to developing internet services

Mike Y. Chen, Emre Kiciman, Eric Brewer
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
To deal with these challenges, operators must constantly be adapting and evolving their system in response to its dynamic behavior.  ...  High dependability in Internet services is a difficult challenge: new features are constantly added, the systems are being scaled to support more users, and these systems are subject to unpredictable workloads  ...  Software Bugs: In addition to short-term recovery from faults, it is often desirable to take more time to fix the source of the failure.  ... 
doi:10.1145/1133373.1133404 dblp:conf/sigopsE/ChenKB02 fatcat:bmcmblq75rbjbkmnxlyuj6q7fe

High-Assurance Distributed, Adaptive Software for Dynamic Systems

Kurt Rohloff, Joseph Loyall, Partha Pal, Richard Schantz
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
Exhaustive testing, documentation, code review, and formal methods have been the main approaches for software certification in high confidence cyber-physical systems.  ...  Examples of such distributed high-assurance systems include DoD systems (including secure, timely command, control and information sharing systems and for military logistics), systems for manufacturing  ...  Related to our utility measurement work is our efforts to develop scalable, adaptive and timebounded general approaches to assure reliability and safety for real-time Node-Failure Detection (NFD) for large-scale  ... 
doi:10.1109/hase.2007.17 dblp:conf/hase/RohloffLPS07 fatcat:avx222d63fcyrkaptud6epnmqq

Architecting Health Management into Software Component Assemblies: Lessons Learned from the ARINC-653 Component Mode

Nagabhushan Mahadevan, Abhishek Dubey, Gabor Karsai
2012 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing  
Complex real-time software systems require an active fault management capability.  ...  In this paper, we present the lessons learned in architecting and applying a twolevel health management strategy to assemblies of software components.  ...  Their main approach was the use of 'safety contracts' to validate the system at design time.  ... 
doi:10.1109/isorc.2012.19 dblp:conf/isorc/MahadevanDK12 fatcat:awfconmzcncejlt4svedxzpzqa
« Previous Showing results 1 — 15 out of 129,616 results