By Topic

2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems

1-3 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 52
  • Proceedings. Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems

    Publication Year: 2003, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (255 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2003, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2003, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2003, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2003, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Edsger Dijkstra

    Publication Year: 2003, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB) | HTML iconHTML

    I was most honoured, but also somewhat confused, by the invitation to give a banquet speech about the late great Edsger Dijkstra at WORDS 2003. This is because the term "banquet speech" is American, and translating it into the English term "after-dinner speech" is rather misleading. In Britain an "after-dinner speech" is meant to be, above all, humorous, so as to be capable of entertaining, and re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependable Infrastructures and Data Managers for Sensor Networks

    Publication Year: 2003, Page(s): 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    This paper provides some directions for developing infrastructures and data managers for dependable sensor networks. By dependable systems we mean systems that adapt to the environment and are secure, fault tolerant and process data in real-time as needed. We start with a discussion of the need for dependable sensor information management and then provide an overview of dependable infrastructures ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application QoS-Based Time-Critical Automated Resource Management in Battle Management Systems

    Publication Year: 2003, Page(s): 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    This paper summarizes some of our unclassified work on concepts and techniques for performing automated run-time time-critical resource management (especially scheduling) in large scale, dynamic, control systems such as for battle management. The approach described here is based on application-level quality of service metrics, such as track quality and weapon spherical error probable. These metric... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the limits of the precise specification of component interfaces

    Publication Year: 2003, Page(s): 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB) | HTML iconHTML

    When trying to find solutions in a problem domain it is a rational step to first explore the limits of the design space. If, during such an endeavor, an impossibility result is encountered, then the further search space can be selectively scoped for solutions to avoid dead-end avenues. With such a perspective, it is the objective of this contribution to outline and discuss the limits of the precis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Dynamically Modifiable Embedded Real-Time Systems

    Publication Year: 2003, Page(s): 28
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    In the paper a Petri net based approach for modeling dynamically modifiable embedded real-time systems is presented. The presented work contributes to the extension of a Petri net based design methodology for distributed embedded systems towards the handling of dynamically modifiable systems. Extensions to the underlying High-Level Petri net model are introduced that allow for dynamic modification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Control Systems for the Safety Integrity Levels 3 and 4

    Publication Year: 2003, Page(s): 35
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    Programs employed for purposes of safety related control must be formally safety licensed, which constitutes a very difficult and hitherto not satisfactorily solved problem. Striving for utmost simplicity and easy comprehensibility of verification methods, the programming methods cause/effect tables and function block diagrams based on verified libraries are assigned to the upper two Safety Integr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Online Feasibility Tests for Admission Control in a Java Real-Time System

    Publication Year: 2003, Page(s): 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    In the Komodo project a real-time Java system based on a multithreaded Java microcontroller has been developed. A main scheduling policy realized by hardware in the microcontroller core is a new scheme called Guaranteed Percentage (GP) scheduling. This scheme assigns each thread a guaranteed percentage of the processor power thus providing a strict isolation of the threads on the processor. To pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Input-Dependency Analysis for Hard Real-Time Software

    Publication Year: 2003, Page(s): 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The execution time of software for hard real-time systems must be predictable. Further, safe and not overly pessimistic bounds for the worst-case execution time (WCET) must be computable. We conceived a programming strategy called WCET-oriented programming and a code transformation strategy, the single-path conversion, that aid programmers in producing code that meets these requirements. These str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Reliable and Timely Task Execution in Mobile Embedded Applications

    Publication Year: 2003, Page(s): 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Tasks controlling a mobile system’s interactions with its environment must be performed reliably and in real-time. Motion control, for example, directs a system’s motions based on information about the environment. As such information is usually incomplete and inaccurate, we developed a solution in which mobile systems perform a distributed fusion of their sensor data. In this paper, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Dependability of the Battlefield Single Integrated Picture through Metrics for Modeling and Simulation of Time-Critical Scenarios

    Publication Year: 2003, Page(s): 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB) | HTML iconHTML

    This paper presents a report of an ongoing research project to test and evaluate temporal and other dependability properties of the battlefield single integrated picture (SIP). It explores modeling and simulations of information flows in the battlespace with a view toward enhancing the SIP. The main emphasis will be on level-one data fusion, i.e. detection, identification and tracking of platforms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the Delay and Synchronization Control for Networked Real-Time Multi-Object Multimedia Applications

    Publication Year: 2003, Page(s): 79
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    Due to the lack of QoS support, ensuring an acceptable application level QoS for the real-time delivery of multi-object multimedia presentations on the current Internet is very challenging. Currently, the only feasible solution is to artificially "equalize" the variable network delays. In this paper, we first investigate the application-level objective performance measures which reflect the user-p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provision of Multimedia Services in a Mobile Ad Hoc Network

    Publication Year: 2003, Page(s): 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Recent advances in wireless technology and availability of mobile computing devices with networking capabilities have generated a lot of interest in wireless ad hoc networks for quality of service (QoS) based multimedia applications. In this paper, we address the problem of QoS guaranteed transmission of pre-orchestrated multimedia data over multiple heterogeneous virtual channels (MHVCs) in a mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing Digital Time Stamping Services to Mobile Devices

    Publication Year: 2003, Page(s): 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Technology evolution in wireless communication is enabling pervasive connectivity to Internet scale systems. In this scenario, security critical applications are being deployed over platforms which include mobile devices. It is thus key that security services be provided to mobile devices as well. Since security functions are typically based on computationally intensive cryptographic algorithms, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global Time-Based Synchronization of Real-Time Multimedia Streaming

    Publication Year: 2003, Page(s): 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    The goal of distributed multimedia applications is to provide reliable high-quality multimedia services to users on a network. Typical distributed multimedia applications use multimedia streaming that continuously processes and transports time-based media such as audio and video on a network. Inter-media synchronization and intra-media synchronization should be supported to facilitate high-quality... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Safety Related Architectures

    Publication Year: 2003, Page(s): 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    Fault and Error latency have a great impact on the dependability properties of control systems for critical applications. The replication techniques that are used to build such systems and the degree of replication usually are tailored to the tolerance of one fault (at a time) and result inadequate to cope with latent errors that show up altogether. For this reason, internal error detection mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architecture and a General Optimization Framework for Resource Management in Dynamic, Distributed Real-Time Systems

    Publication Year: 2003, Page(s): 118
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This paper presents a model that is useful for developing resource allocation algorithms for distributed real-time systems that operate in dynamic environments. Interesting aspects of the model include dynamic environments, utility and service levels, which provide a means for graceful degradation in resource-constrained situations and support optimization of the allocation of resources. A softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Configuration Management and Co-Simulation in Distributed Embedded Systems

    Publication Year: 2003, Page(s): 125
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    Configuration management in distributed real-time systems and applications is considered. In particular, an idea for specifying the SW and HW architectures and modeling the dynamical behaviour of embedded real-time applications with timed hierarchical state diagrams is indicated. By their translation to program code, schedulable objects are formed, representing the applications’ semantics. A ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault-Tolerant Real-Time Multicast Protocol RFRM/X

    Publication Year: 2003, Page(s): 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Fault-tolerant real-time multicast protocols are needed to develop fault-tolerant distributed real-time services such as group membership and redundancy management. In this paper, we propose the fault-tolerant real-time multicast protocol RFRM/X which is extended from RFRM. RFRM/X integrates clock synchronization module into the faulot manager by replacing heartbeat messages by clock synchronizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tolerance to Access-Point Failures in Dependable Wireless Local-Area Networks

    Publication Year: 2003, Page(s): 136
    Cited by:  Papers (8)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    In one of the modes of operation defined by the IEEE 802.11 standard, mobile stations are connected to a wired network via an access-point that serves as a bridge between the wireless and the wired networks. If an access-point fails, then, all of the mobile stations connected to a wired network via the access-point can lose connectivity. In this paper, we address the problem of enhancing the depen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redundant Optical Path Design Based on Multiagents and Its Experimental Evaluation

    Publication Year: 2003, Page(s): 144
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    This paper discusses a fault tolerant technique called redundant path design in wavelength division multiplexing networks, in which backup paths between source and destination nodes, such that when primary paths between them fail the primary paths are quickly switched to the backup paths, are prepared. Unlike the previous centralized approaches, this paper proposes two multiagent-based methods cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.