2013
DOI: 10.1017/s096012951200028x
|View full text |Cite
|
Sign up to set email alerts
|

Rigorous implementation of real-time systems – from theory to application

Abstract: The correct and efficient implementation of general real-time applications remains very much an open problem. A key issue is meeting timing constraints whose satisfaction depends on features of the execution platform, in particular its speed. Existing rigorous implementation techniques are applicable to specific classes of systems, for example, with periodic tasks or time-deterministic systems.We present a general model-based implementation method for real-time systems based on the use of two models: -An abstr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…For the enforcement of the property, an Action flow architecture was instantiated using the two components as operands of type B. Table 8 shows the mapping of their ports for actions a [1] and a [2] to port type parameters. Figure 11 presents the result of applying the architecture, which adds the coordinator and two connectors shown with dashed lines.…”
Section: Action Flowmentioning
confidence: 99%
See 1 more Smart Citation
“…For the enforcement of the property, an Action flow architecture was instantiated using the two components as operands of type B. Table 8 shows the mapping of their ports for actions a [1] and a [2] to port type parameters. Figure 11 presents the result of applying the architecture, which adds the coordinator and two connectors shown with dashed lines.…”
Section: Action Flowmentioning
confidence: 99%
“…HK-04-P3.1: globally, obs(s001) precedes beg(a001) States s001 and s002 belong to the same state-set, hence, they can be enforced through a single Mode management architecture in which k = 2. The style parameters shown in Table 9 associate state s001 with mode [1] and state s002 with mode [2]. The m [1]b and m [2]b port types are mapped to the beg(M) of each pattern, namely the beg(a001) (evaluated as HK PL read.mem write req) and beg(a002).…”
Section: Mode Managementmentioning
confidence: 99%
“…We recall that BIP has been introduced as a component-based framework where systems are obtained by composition of untimed atomic components with multi-party interactions, and coordinated using dynamic priorities. RT-BIP (Abdellatif et al, 2013) extended BIP with real-time features and has (dense) real-time semantics based on timed automata concepts (Alur and Dill, 1994). S-BIP (Nouri et al, 2015) extended BIP with stochastic features and has (discrete) stochastic semantics based on Markov chains.…”
Section: Stochastic Real-time Bipmentioning
confidence: 99%
“…We recall that BIP has been introduced as a component-based framework where systems are obtained by composition of untimed atomic components with multi-party interactions, and coordinated using dynamic priorities. RT-BIP (Abdellatif et al, 2013) extended BIP with real-time features and has (dense) real-time semantics based on timed automata concepts (Alur and Dill, 1994). S-BIP (Nouri et al, 2015) extended BIP with stochastic features and has (discrete) stochastic semantics based on Markov chains.…”
Section: Stochastic Real-time Bipmentioning
confidence: 99%