Component-Based Modeling and Verification of Dynamic Adaptation in Safety-Critical Embedded Systems

被引:17
|
作者
Adler, Rasmus [1 ]
Schaefer, Ina [1 ]
Trapp, Mario [1 ]
Poetzsch-Heffter, Arnd [1 ]
机构
[1] Univ Kaiserslautern, Dept Comp Sci, Software Technol Grp, D-67653 Kaiserslautern, Germany
关键词
Design; Reliability; Verification; Adaptive embedded systems; component-based modeling; verification;
D O I
10.1145/1880050.1880056
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Adaptation is increasingly used in the development of safety-critical embedded systems, in particular to reduce hardware needs and to increase availability. However, composing a system from many reconfigurable components can lead to a huge number of possible system configurations, inducing a complexity that cannot be handled during system design. To overcome this problem, we propose a new component-based modeling and verification method for adaptive embedded systems. The component-based modeling approach facilitates abstracting a composition of components to a hierarchical component. In the hierarchical component, the number of possible configurations of the composition is reduced to a small number of hierarchical configurations. Only these hierarchical configurations have to be considered when the hierarchical component is used in further compositions such that design complexity is reduced at each hierarchical level. In order to ensure well-definedness of components, we provide a model of computation enabling the formal verification of critical requirements of the adaptation behavior.
引用
收藏
页数:39
相关论文
共 50 条
  • [1] A Component-based Dynamic Link Support for Safety-critical Embedded Systems
    Kajtazovic, Nermin
    Preschern, Christopher
    Kreiner, Christian
    [J]. 2013 20TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2013), 2013, : 92 - 99
  • [2] Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
    Kajtazovic, Nermin
    Preschern, Christopher
    Hoeller, Andrea
    Kreiner, Christian
    [J]. SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2015, 569 : 113 - 130
  • [3] On design-time modelling and verification of safety-critical component-based systems
    Kajtazovic N.
    Preschern C.
    Höller A.
    Kreiner C.
    [J]. International Journal of Networked and Distributed Computing, 2014, 2 (3) : 175 - 188
  • [4] On Design-time Modelling and Verification of Safety-critical Component-based Systems
    Kajtazovic, Nermin
    Preschern, Christopher
    Hoeller, Andrea
    Kreiner, Christian
    [J]. INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2014, 2 (03) : 175 - 188
  • [5] Dependability of Safety-Critical Computer Systems through Component-Based Evolution
    Kharchenko, Vyacheslav
    Sklyar, Vladimir
    Siora, Alexandr
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2009, : 42 - 49
  • [6] A component-based approach to specify hazards in the design of safety-critical systems
    Lu, SR
    Halang, WA
    Schmidtt, HW
    Gumzej, R
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 680 - 685
  • [7] A Component-Based Approach for the Specification and Verification of Safety-Critical Software: Application to a Platoon of Vehicles
    Souquieres, Jeanine
    [J]. ERCIM NEWS, 2008, (75): : 33 - 34
  • [8] Platform modeling in safety-critical embedded systems
    Huber, Bernhard
    Obermaisser, Roman
    [J]. Lecture Notes in Electrical Engineering, 2009, 38 : 145 - 158
  • [9] Component-Based Modeling for Embedded Systems
    Chen, Fulong
    Fan, Xiaoya
    Wei, Jianjun
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 414 - +
  • [10] Automatic composition of AADL models for the verification of critical component-based embedded systems
    Balp, Hugues
    Borde, Etienne
    Haik, Gregory
    Tilman, Jean-Francois
    [J]. ICECCS 2008: THIRTEENTH IEEE INTERNATIONAL CONFERENCE ON THE ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2008, : 269 - 274