2020 9th Mediterranean Conference on Embedded Computing (MECO) 2020
DOI: 10.1109/meco49872.2020.9134339
|View full text |Cite
|
Sign up to set email alerts
|

Variability-Aware Process Extension for Updating Cyber Physical Systems Over the Air

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Here, feature modeling is a widespread method to model the variant space of the product line. Features describe the variability points in a product line as well as their inter-dependencies [23]. Besides that, the mapping between features and implementation artifacts, such as ECUs or software components, is important for building system variants and maintaining traceability [22].…”
Section: /Maintmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, feature modeling is a widespread method to model the variant space of the product line. Features describe the variability points in a product line as well as their inter-dependencies [23]. Besides that, the mapping between features and implementation artifacts, such as ECUs or software components, is important for building system variants and maintaining traceability [22].…”
Section: /Maintmentioning
confidence: 99%
“…For this, we use a feature tree and a variable architecture model, called 150% model; both will be introduced in section V-A. This step is called, according to [23], impact analysis. It results in a reduced variant model, named variant- representative model.…”
Section: B Pre-deploymentmentioning
confidence: 99%
“…Often, an over-the-air update of the vehicle's software to eradicate the problem or vulnerability will be required. However, it must be ensured that an update does not jeopardize the safety of the vehicle [57]. Finally, new SIEM rules that capture the detected incident can be added to the correlation process to facilitate analysis of similar incidents in the future.…”
Section: ) Example Setupmentioning
confidence: 99%
“…According to [2], highly configurable systems (e.g., embedded software) contain various constraints, and it requires extracting these constraints from software code to design valid configurations. This raises the need for a model that displays embedded software's integrated variants and constraints details to facilitate the functions verification and validation effort [3]. There are studies, e.g., [4]- [6] indicating that the constraints of embedded software are efficiently manageable and easily expressible with the help of a feature model.…”
Section: Introductionmentioning
confidence: 99%