By Topic

Software Engineering and Advanced Applications (SEAA), 2012 38th EUROMICRO Conference on

Date 5-8 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 84
  • [Cover art]

    Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (307 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (163 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (178 KB)  
    Freely Available from IEEE
  • Message from the General Chair

    Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Chairs

    Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Program Committee

    Page(s): xv - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • Reviewers

    Page(s): xviii - xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (129 KB)  
    Freely Available from IEEE
  • Sponsors

    Page(s): xxiv
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Organizer

    Page(s): xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • Model-Driven Engineering and the Impact of a Change

    Page(s): xxvi - xxvii
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (131 KB)  

    These keynote speeches discuss the following: Model-driven engineering and the impact of a change; Things aren't always what they seem: Three examples of seemingly proper statistical analyses leading to unsubstantiated software engineering claims. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DiplodocusDF, a Domain-Specific Modelling Language for Software Defined Radio Applications

    Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    Given its intrinsic complexity, it is not efficient to develop software defined radio (SDR) systems following traditional methodologies. A new methodology is necessary, which should allow the description of the applications at higher abstraction levels. This paper describes such a methodology. It includes domain specific modelling languages (DSML) for SDR applications / SDR architectures, and the mechanisms to generate automatically the deployment code. The DSML language is described with precise syntax and semantics to support simulation, synthesis, and formal analysis. The potential of the modelling language is illustrated by designing a cognitive radio application called Welch period gram detector. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MDD Approach for RTOS Integration on Valid Real-Time Design Model

    Page(s): 9 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (751 KB) |  | HTML iconHTML  

    The transition from the design model to the implementation model is a critical phase in Real-Time Embedded Systems development process. Indeed, this model must conserve functional and non-functional requirements of the design model on the target execution platform. In this paper, we propose a two-steps approach based on an explicit description of two types of platform: the abstract platform used at the design level to validate the different design choices, and the concrete execution platform. The first step consists in feasibility tests whose role is to help the designer detecting the potential refinement problems. The second step is a mapping step that ensures the compliance of the implementation model with the design model taking into consideration the characteristics of the target execution platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-view Power Modeling Based on UML, MARTE and SysML

    Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    In embedded systems, non-functional and functional aspects are closely related and cannot be considered independently. However, the high complexity of systems requires a large domain of competencies and experts in various domains have to work concurrently on different aspects of the same systems. This is why we propose a multi-view model where each view represents a specific domain. The different views are connected to each other by explicit associations that maintain consistency. The whole system is the sum of all the aspects of elements in all the views. This multi-view approach is implemented in a dedicated UML profile based on MARTE and SysML. This article specifically focuses on the power view and its relationship to other functional or non-functional, structural or behavioral aspects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Property-Based Proof System for Contract-Based Design

    Page(s): 21 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    Contract-based design is an emerging paradigm for the design of complex systems, where each component is associated with a contract, i.e., a clear description of the expected behaviour. Contracts specify the input-output behaviour of a component by defining what the component guarantees, provided that the its environment obeys some given assumptions. The ultimate goal of contract-based design is to allow for compositional reasoning, stepwise refinement, and a principled reuse of components that are already pre-designed, or designed independently. In this paper, we present a novel, fully formal contract framework. The decomposition of the system architecture is complemented with the corresponding decomposition of component contracts. The framework exploits such decomposition to automatically generate a set of proof obligations, which, once verified, allow concluding the correctness of the top-level system properties. The framework relies on an expressive property specification language, conceived for the formalization of embedded system requirements. The proof system reduces the correctness of contracts refinement to entailment of temporal logic formulas, and is supported by a verification engine based on automated SMT techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Max-Plus Algebraic Throughput Analysis of Synchronous Dataflow Graphs

    Page(s): 29 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    In this paper we present a novel approach to throughput analysis of synchronous dataflow (SDF) graphs. Our approach is based on describing the evolution of actor firing times as a linear time-invariant system in max-plus algebra. Experimental results indicate that our approach is faster than state-of-the-art approaches to throughput analysis of SDF graphs. The efficiency of our approach is due to an exploitation of the regular structure of the max-plus system's graphical representation, the properties of which we thoroughly prove. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for the Development of Parallel and Distributed Real-Time Embedded Systems

    Page(s): 39 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (289 KB) |  | HTML iconHTML  

    Embedded real-time applications increasingly present high computation requirements, which need to be completed within specific deadlines. But, those applications present highly variable patterns, depending on the data set in a determined instant. The current trend to provide parallel processing in the embedded domain allows providing higher processing power, however, it does not address the variability in the processing pattern. Dimensioning each device for its worst-case scenario implies lower average utilization, and increased available, but unusable, processing in the overall system. A solution for this problem is to extend the parallel execution of the applications, allowing networked nodes to distribute the workload, on peak situations, to neighbour nodes. In this context, this paper proposes a framework to develop parallel and distributed real-time embedded applications, transparently using OpenMP and Message Passing Interface (MPI), within a programming model based on OpenMP. The paper also devises an integrated timing model, which enables the structured reasoning on the timing behaviour of these hybrid architectures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring Modular Safety Software Certification by Using Common Criteria Concepts

    Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (151 KB) |  | HTML iconHTML  

    Safety and security certification are time and money consuming tasks. Changes to certified systems usually require re-certification of the whole product. Modular certification approaches applied to the safety and security domain aim at reducing these costs. In this paper, modular certification concepts with focus on IEC 61508 safety certification are analyzed and an approach for structuring the modular certification process by providing detailed requirements is suggested. We gather requirements from the security domain in order to fulfill objectives which have to be reached to enable modular safety certification. Functional requirements are taken from the Common Criteria Separation Kernel Protection Profile and assurance requirements are taken from a Common Criteria class responsible for compositional security certification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Proxy Tool Support in an AUTOSAR Development Environment

    Page(s): 51 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (245 KB) |  | HTML iconHTML  

    AUTOSAR has been introduced as a remedy for the increasing complexity and rising costs within automotive systems development. However, AUTOSAR does not provide sufficient support for the increased complexity with respect to data management. Database proxies have been presented as a promising solution to provide software component technologies with the capabilities of a state-of-the-art real-time database management system. In this paper, we show how an industrial AUTOSAR development environment can be extended to include support for real-time data management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Long-Running Controller Applications for Specification Violations Based on Deterministic Replay

    Page(s): 55 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (636 KB) |  | HTML iconHTML  

    Deterministic replay debugging is a technique aimed at finding and debugging software failures occurring in field operation that are usually hard to reproduce. With deterministic replay debugging a software run is recorded, so that it can be reproduced deterministically in a debugger. While deterministic replay debugging is capable of reproducing a failure, in practice, especially in the case of a long-running application, it is still hard for the developer to locate the exact position of the failure in the trace log. Based on our previous work on deterministic replay debugging, we propose an approach to use behavior specifications in the form of test cases to search a recorded trace log. We first present a formal approach for the specification of test cases for PLC applications based on hybrid automata. Then we present a method for searching a recorded program trace for occurrences of the test scenario. That way, we can not only identify regions where a specification violation occurred, but also the corresponding regions in the trace where the test case passed, which can then be further used for comparison. We present the theoretical background of our approach, an implementation of the trace search algorithm, and an example application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Varying Topology of Component-Based System Architectures Using Metaheuristic Optimization

    Page(s): 63 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    Today's complex systems require software architects to address a large number of quality properties. These quality properties can be conflicting. In practice, software architects manually try to come up with a set of different architectural designs and then try to identify the most suitable one. This is a time-consuming and error-prone process. Also this may lead the architect to sub optimal designs. To tackle this problem, metaheuristic approaches, such as genetic algorithms, for automating architecture design have been proposed. Metaheuristic approaches use degrees of freedom to automatically generate new solutions. In this paper we present how to address topology of the hardware platform as a degree of freedom for system architectures. This aspect of varying architectures has not yet been addressed in existing metaheuristic approaches to architecture design. Our approach is implemented as part of the AQOSA (Automated Quality-driven Optimization of Software Architectures) framework. AQOSA aids architects by automatically synthesizing optimal solutions by using multiobjective evolutionary algorithms and it reports the trade-offs between multiple quality properties as output. In this paper we use an example system to show that the hardware-topology degree of freedom helps evolutionary algorithm to explore a larger design space. It can find new architectural solutions which would not be found otherwise. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Automatic Synthesis of Hardware-Specific Code in Component-Based Embedded Systems

    Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    Most component models currently in use do not try to provide extensive support for dealing with hardware devices like sensors and actuator. Lack of such support means that software components and subsystems often include device- and platform-specific code, limiting our ability to reuse them and forcing us to deal with specifics of underlying hardware in high-level software models. In this paper we propose a solution that would enable automatic generation of device-specific code. We remove device- and platform-specific code outside of software components and specifying it as reusable units. Based on a system model we then generate glue-code that binds this reusable units of code to each other and to the software components, resulting in a system-specific solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bridge from System to Software Development for Safety-Critical Automotive Embedded Systems

    Page(s): 75 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    In this paper, we present a tool enhancement that allows an effective transition from the system level development phase to the software level development phase of a tool-supported safety engineering workflow aligned with the automotive functional safety standard ISO 26262. The tool enhancement has capabilities for model generation and code generation. Whereas the generation of Simulink models supports the development of application software, the configuration and generation of safety drivers supports the development of the basic software required for initialization, runtime fault detection and error handling. We describe the safety engineering workflow and its supporting tool chain including the tool enhancement. Moreover we demonstrate that the enhancement supports the transition from the system level development phase to the software level development phase using the case study of a hybrid electric vehicle development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Component Integration Using Runnable Virtual Nodes

    Page(s): 80 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    We present the concept of runnable virtual nodes (RVNs) as means to achieve predictable integration and temporal error-containment of real-time software components. An RVN exploits the latest techniques for hierarchical scheduling and is intended as a coarse-grained component for single-node deployment, that provides functional and temporal isolations with respect to its environment. It uses a two-level deployment process, i.e. deploying functional entities to RVNs and then deploying RVNs to physical nodes. The two-level deployment process not only gives development benefits with respect to compos ability, system integration, testing, validation and certification but also leverages the hierarchical scheduling to preserve the validity of an RVN's internal temporal behaviour when integrated with other components. We have applied our approach to a simple case study, implemented in the ProCom component-technology executing on top of FreeRTOS-based hierarchical scheduling and present our initial results as a proof-of-concept. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.