2017
DOI: 10.1007/s12652-017-0449-9
|View full text |Cite
|
Sign up to set email alerts
|

Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Once the BPMN+BPSIM model is transformed into the I2M, the subsequent transformation step involves the conversion of the I2M into a DEVS model which is carried out using Model to Model transformation. Finally, DEVS-Suite code is generated using Model to Text (JAVA Code) transformation similar to the one performed in Robati et al (2015). The generated code can then be executed in the DEVS-Suite simulator (Sarjoughian and Mahmoodi Markid 2012).…”
Section: Transformationmentioning
confidence: 99%
“…Once the BPMN+BPSIM model is transformed into the I2M, the subsequent transformation step involves the conversion of the I2M into a DEVS model which is carried out using Model to Model transformation. Finally, DEVS-Suite code is generated using Model to Text (JAVA Code) transformation similar to the one performed in Robati et al (2015). The generated code can then be executed in the DEVS-Suite simulator (Sarjoughian and Mahmoodi Markid 2012).…”
Section: Transformationmentioning
confidence: 99%
“…The sharing of hardware platforms makes the architecture integration into a virtual process, which shifts the temporal verification task from the supplier to the integrator [33]. Modeling is a promising method to settle these problems by simulating and validating the virtual integration plan [34], [35]: meanwhile, tools such as the AADL-based toolsets are designed for the verification of the design [29], and the utilization of timed automata for IMA temporal requirement verification was designed and proven to be helpful. Furthermore, CPM utilization and communication robustness performance criteria are used to quantify the quality of a set of valid temporal allocations [36].…”
Section: Related Work a Temporal Allocation In Ima Integrationmentioning
confidence: 99%
“…7 To improve the quality of clock synchronization, TTEthernet o®ers fault-tolerant clock synchronization algorithm and fault isolation mechanisms to manage nodes failures. 8 TTEthernet is con¯gurable to support singlefailure and dual-failure hypotheses. Under the single-failure hypothesis, TTEthernet is intended to tolerate either the fail-arbitrary failure of an end system or the failinconsistent-omission failure of a switch.…”
Section: Introductionmentioning
confidence: 99%