Primus Epic(TM) is an all-new integrated avionics system for business, regional and general aviation. Honeywell international Inc. follows the objectoriented paradigm and the programming language C++ for certain soft...
详细信息
ISBN:
(纸本)0769519288
Primus Epic(TM) is an all-new integrated avionics system for business, regional and general aviation. Honeywell international Inc. follows the objectoriented paradigm and the programming language C++ for certain software components on systems developed for the PRIMUS EPIC system. While C++ programming language offers several advantages, it also has several features that can make it undesirable for use in airborne systems. the object Orientation concept has several features that, if not controlled properly, can lead to unknown configurations of object code and unverified code. this is highly undesirable for avionics software that needs certification involving statement and code coverage. this paper highlights the issues with C++ certification for avionics and provides solutions for some of the issues.
Structuring real-time concurrent programs in the form of groups of fixed-priority processes is an old art which is appropriate for only a small fraction of modem real-timedistributedcomputing application systems. Ho...
详细信息
ISBN:
(纸本)0769519288
Structuring real-time concurrent programs in the form of groups of fixed-priority processes is an old art which is appropriate for only a small fraction of modem real-timedistributedcomputing application systems. However, it is still practiced on the basis of an insufficient technical foundation. One of the basic issues in using the fixed-priority process structuring approach is to avoid the priority inversion phenomenon. It is argued that priority inversions are essentially due to the inappropriate approach used for structuring programs including the specification of the policy for allocating resources. Several basic program structuring techniques which are effective means of avoiding priority inversions are presented.
the paper describes design and implementation of software infrastructure for building augmented reality applications for ubiquitous computing environments. Augmented reality, is one of the most important techniques to...
详细信息
ISBN:
(纸本)0769519288
the paper describes design and implementation of software infrastructure for building augmented reality applications for ubiquitous computing environments. Augmented reality, is one of the most important techniques to achieve the vision of ubiquitous computing. Traditional toolkits for aligmented reality provide the high level abstraction that makes it easy to but. Id augmented reality, applications. However, the applications programmers need to contemplate distribution and context-awareness that make the development of applications very hard, but they are necessary to build ubiquitous computing environments. Our infrastructure provides the high level abstraction and hides distribution and con text-awareness from programmers. therefore, the cost to develop augmented reality applications will be reduced dramatically by using our middleware infrastructure.
We discuss how to invoke a method on multiple object replicas in a quorum-based way. Suppose each instance of a method t on replicas of an object x invokes another method u on replicas in a quorum of an object y. Here...
ISBN:
(纸本)0769519288
We discuss how to invoke a method on multiple object replicas in a quorum-based way. Suppose each instance of a method t on replicas of an object x invokes another method u on replicas in a quorum of an object y. Here, the method u is redundantly invoked multiple times on some replicas of the object y. If each instance of the method t issues a method to its own quorum, more number of replicas are manipulated than the quorum number this is quorum expansion. We discuss a protocol to invoke methods on replicas in a nested manner without the redundant invocation and quorum expansion. We evaluate the protocol on how many replicas are manipulated and requests are issued.
For real-time systems we need time-predictable processors. this paper presents a method cache as a time-predictable solution for instruction caching. the method cache caches whole methods (or functions) and simplifies...
详细信息
ISBN:
(纸本)9781479944309
For real-time systems we need time-predictable processors. this paper presents a method cache as a time-predictable solution for instruction caching. the method cache caches whole methods (or functions) and simplifies worst-case execution time analysis. We have integrated the method cache in the time-predictable processor Patmos. We evaluate the method cache with a large set of embedded benchmarks. Most benchmarks show a good hit rate for a method cache size in the range between 4 and 16 KB.
In this paper, we present a systems engineering methodology for constructing certifiable real-timedistributed systems. In the proposed approach, an architectural and algorithmic solution to an application problem is ...
详细信息
ISBN:
(纸本)0769519288
In this paper, we present a systems engineering methodology for constructing certifiable real-timedistributed systems. In the proposed approach, an architectural and algorithmic solution to an application problem is designed by considering the "'weakest" models including the weakest asynchronous computational model and multimodal arrival model. Furthermore, timeliness properties are described using Jensen's benefit accrual predicates. Once a system solution is designed, timeliness properties are established by constructing necessary feasibility conditions that are expressed as non-valued predicates. the predicates are quantified and verified to produce the specification of a certified solution. We illustrate the approach by considering a packet transmission problem that desire soft timeliness. We present a certifiable solution to this problem that consists of switched Ethernet, a soft real-time packet scheduling algorithm (that was previously developed), and feasibility conditions.
In object-orientedreal-timecomputing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Corba object references as authorization...
详细信息
ISBN:
(纸本)9780769527659
In object-orientedreal-timecomputing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Corba object references as authorization tokens. this paper investigates the security of this method in principle, and it presents the results of the analysis of the work and computing effort necessary for a potential attacker to fabricate Corba object references to existing objects for the purpose of illegitimately gaining access to these objects at the instance of seven widely used Corba products.
object-oriented programming languages are extensively used in real-time systems. When calculating the worst case execution time for object-oriented programs one needs flow information, such as loop bounds and informat...
详细信息
ISBN:
(纸本)0769515584
object-oriented programming languages are extensively used in real-time systems. When calculating the worst case execution time for object-oriented programs one needs flow information, such as loop bounds and information on infeasible paths. In most cases, the programmer is expected to supply these as manual annotations. this paper presents a prototype tool which calculates this information automatically for realtimeTalk (RTT) programs. RTT is a real-time version of the object-oriented language Smalltalk. We also show the analysis of a number of example programs.
暂无评论