By Topic

Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2011 14th IEEE International Symposium on

Date 28-31 March 2011

Filter Results

Displaying Results 1 - 25 of 44
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (517 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (22 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • Message from the Symposium Co-chairs

    Publication Year: 2011 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Co-chairs

    Publication Year: 2011 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organization Committee

    Publication Year: 2011 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • International Program Committees

    Publication Year: 2011 , Page(s): xii - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • Secondary Reviewers

    Publication Year: 2011 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Maximizing Service Uptime of Smartphone-Based Distributed Real-Time and Embedded Systems

    Publication Year: 2011 , Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (460 KB) |  | HTML iconHTML  

    Smart phones are starting to find use in mission critical applications, such as search-and-rescue operations, wherein the mission capabilities are realized by deploying a collaborating set of services across a group of smart phones involved in the mission. Since these missions are deployed in environments where replenishing resources, such as smart phone batteries, is hard, it is necessary to maxi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Quality of Service Management for Multicast Tactical Communications

    Publication Year: 2011 , Page(s): 11 - 18
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (616 KB) |  | HTML iconHTML  

    Wireless networking is moving toward the adoption of IP protocols and away from the multitude of special-purpose tactical radios traditionally in the hands of emergency personnel, military personnel, and law enforcement. The adoption of standards, such as IP multicast, has facilitated this. IP multicast also enables recovering some of the advantages of the broadcast medium when using IP in tactica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Selection Method for Services in Dynamic Environments

    Publication Year: 2011 , Page(s): 19 - 23
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    Service selection is one of the current challenges in Service Oriented Computing (SOC). We propose a service selection method for replacing used services in case of a failure. The approach considers the functional as well as the non-functional features of services. Furthermore, the service selection method searches for a service just meeting the requirements and not for the best possible service e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictable Communication for Mobile Systems

    Publication Year: 2011 , Page(s): 24 - 28
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    Many industrial and medical scenarios today are building on mobile devices as their end systems. These devices are typically connected to backend systems via the mobile phone network with their corresponding data services. Today's network protocols are optimized for reliable transfer of voice traffic, however, available bandwidth and latency for data traffic may vary significantly with location an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication in Time-Triggered Systems Using Time-Delayed Release of Keys

    Publication Year: 2011 , Page(s): 31 - 39
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (405 KB) |  | HTML iconHTML  

    This paper investigates on the security of time -- triggered transmission channels, which are used to establish a predictable and timely message transfer in a distributed embedded system with potential safety constraints. Within such a system, safety and security are closely related, because malicious attacks can have an impact on a system's safety and thereby cause severe damage. An attacker coul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Multicast and Memory Replication Channels with Delay Bounded Error Detection and Retry Capabilities

    Publication Year: 2011 , Page(s): 40 - 49
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (557 KB) |  | HTML iconHTML  

    In order to accommodate different requirements of reliable multicast applications, the real-time reliable multicasting support framework must possess generic yet rich features for detecting and reporting message losses with tight latency bounds. One highly promising concrete formulation of a multicast framework is the Real-time Multicast & Memory Replication Channel (RMMC) scheme. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling Multi Clock Real Time Systems: From Requirements to Implementation

    Publication Year: 2011 , Page(s): 50 - 57
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    This paper presents an approach for modeling simulating and analyzing multi clocks real time systems during the different steps of a design. These steps range from the first requirements to a model allocated on a specific execution platform. The UML MARTE profile and the CCSL language are used together to specify the causal and temporal characteristics of the software as well as the hardware parts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling MARTE Sequence Diagram with Timing Pi-Calculus

    Publication Year: 2011 , Page(s): 61 - 66
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (196 KB) |  | HTML iconHTML  

    Modeling and Analysis of Real-Time and Embedded Systems specification (MARTE) is a profile of the Unified Modeling Language (UML) for model driven development of real-time and embedded systems. To describe formally the semantics of MARTE sequence diagram (MARTE SD), we introduce the timing pi-calculus, a new variant of the pi-calculus, in this paper. The good feature of the timing pi-calculus is t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Based Transformation Process to Validate and Implement High-Integrity Systems

    Publication Year: 2011 , Page(s): 67 - 74
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (831 KB) |  | HTML iconHTML  

    Despite numerous advances, building High-Integrity Embedded systems remains a complex task. They come with strong requirements to ensure safety, schedulability or security properties, one needs to combine multiple analysis to validate each of them. Model-Based Engineering is an accepted solution to address such complexity: analytical models are derived from an abstraction of the system to be built... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Interface Definition Language Extensions (IDL3+) Using Domain-Specific Modeling Languages

    Publication Year: 2011 , Page(s): 75 - 82
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    Model-driven engineering (MDE) of distributed real-time and embedded (DRE) systems built using distributed middleware technologies typically rely on interface definition language (IDL) to define interfaces and attributes of the system under development. Recent needs for using IDL to design and implement systems composed of heterogeneous communication architectures, however, has realized the limita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generalized Model to Control the Throughput in a Processor for Real-Time Applications

    Publication Year: 2011 , Page(s): 83 - 88
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    In this paper we present a control theory approach to stabilize the throughput of threads for real-time applications on a multithreaded processor. We use a statistical model of a super scalar, multi-threaded processor as transfer function to calculate the resulting IPC rate. Our control theory approach is not limited to a specific processor and can be adapted to different microprocessor architectu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Analyzing Real-Time Data Streams

    Publication Year: 2011 , Page(s): 91 - 98
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1442 KB) |  | HTML iconHTML  

    Achieving situation awareness is especially challenging for real-time data stream applications because they i) operate on continuous unbounded streams of data, and ii) have inherent real-time requirements. In this paper we show how formal data stream modeling and analysis can be used to better understand stream behavior, evaluate query costs, and improve application performance. We use MEDAL, a fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Time-Predictable Object Cache

    Publication Year: 2011 , Page(s): 99 - 105
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (288 KB) |  | HTML iconHTML  

    Static cache analysis for data allocated on the heap is practically impossible for standard data caches. We propose a distinct object cache for heap allocated data. The cache is highly associative to track symbolic object addresses in the static analysis. Cache lines are organized to hold single objects and individual fields are loaded on a miss. This cache organization is statically analyzable an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring Real-Time Java Profiles

    Publication Year: 2011 , Page(s): 109 - 116
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (707 KB) |  | HTML iconHTML  

    Just like other software, Java profiles benefits from refactoring when they have been used and have evolved for some time. This paper presents a refactoring of the Real-Time Specification for Java (RTSJ) and the Safety Critical Java (SCJ) profile (JSR-302). It highlights core concepts and makes it a suitable foundation for the proposed levels of SCJ. The ongoing work of specifying the SCJ profile ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Middleware Support for Real-Time SOA

    Publication Year: 2011 , Page(s): 117 - 124
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (463 KB) |  | HTML iconHTML  

    Service-oriented architectures (SOA) provide application systems the flexibility and cost-savings of dynamically composing workflows from reusable services. However, current SOA frameworks do not provide support for real-time workflow planning and execution. The goal of the RT-Llama SOA middleware framework is to address these new requirements. It works both at the service-level, by enhancing exis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.