By Topic

Proceedings Sixth International Workshop on Object-Oriented Real-Time Dependable Systems

8-10 Jan. 2001

Filter Results

Displaying Results 1 - 25 of 34
  • Proceedings Sixth International Workshop on Object-Oriented Real-Time Dependable Systems

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 269
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Open multithreaded transactions: keeping threads and exceptions under control

    Publication Year: 2001, Page(s):197 - 205
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    Although transactional models have proved to be very useful for numerous applications, the development of new models to reflect the ever-increasing complexity and diversity of modern applications is a very active area of research. Analysis of the existing models of multithreaded transactions shows that they either give too much freedom to threads and do not control their participation in transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure management for FT-CORBA applications

    Publication Year: 2001, Page(s):186 - 193
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    In this paper we present the failure management system of IRL (Interoperable Replication Logic), a FT-CORBA platform that provides transparent client/server interactions and server failovers to application clients by using a set of replicated CORBA objects (IRL components). The IRL failure management system includes two basic mechanisms, failure detection and recovery. Each of these mechanisms fol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client-side enhancements using portable interceptors

    Publication Year: 2001, Page(s):179 - 185
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Interceptors are a useful technique for extending the basic functionality provided by an Object Request Broker without changing its implementation, nor affecting client code. The recently proposed CORBA standard includes a new definition of portable interceptors. This definition is very powerful, yet not trivial to use. The authors review this definition, and discuss how it can be applied to provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with tasking overload in object oriented real-time applications design

    Publication Year: 2001, Page(s):214 - 220
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    This paper deals with the overload caused by excessive service requests from the environment for dynamic control systems. A method of providing gracefully degraded solutions is proposed, based on the previous work on the project dealing with the design of a consistent embedded real-time control system with the goal of increasing its dependability. A syntax is defined as an enhancement of the objec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An environment for generating visual applications involving real-time remote procedure calls

    Publication Year: 2001, Page(s):233 - 239
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    The Visual Environment for the Development of Real-Time Parallel Programs (http://www.dc.ufscar.br/~tev) has been designed to facilitate the change from the sequential to the parallel paradigm. This graphic environment enables the fast prototyping of parallel applications executed in the real-time operating system Virtuoso from Eonic Systems Inc (http://www.eonic.com). Such parallel applications r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ordered delivery of messages for various types of invocations in object-based systems

    Publication Year: 2001, Page(s):251 - 254
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Distributed applications are realized by the cooperation of a group of multiple objects. In the group cooperation, an object multicasts a message and sends in parallel multiple kinds of messages to multiple destinations, i.e. parallel-cast in addition to unicasting messages. The object waits for multiple messages in a conjunctive and disjunctive way from multiple objects. We newly define a novel p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of RT-Appia

    Publication Year: 2001, Page(s):261 - 268
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    This paper presents the design of RT-Appia, a framework for the development and implementation of configurable real-time protocol stacks. The goal of RT-Appia is to allow the construction of specialized protocols through the composition of pre-defined micro-protocols. RT-Appia attempts to balance the flexibility and efficiency of micro-protocols with the predictability requirements of real-time ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A middleware implementation and performance evaluation of the SNS scheme for network surveillance

    Publication Year: 2001, Page(s):43 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    Network surveillance (NS), which is basically a (partially or fully) decentralized mode of detecting the faulty/repaired status of distributed computing (DC) components, is a major part of real-time (RT) fault-tolerant DC. One NS technique which is broadly applicable and amenable to rigorous quantitative analyses of fault coverage is the supervisor-based network surveillance (SNS) scheme for use i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault management in ECLIPSE

    Publication Year: 2001, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    ECLIPSE is a next-generation virtual telecommunication network that provides multimedia services that integrate voice, video, text and images. ECLIPSE facilitates the modular decomposition of new telecommunication services. In this paper, we sketch the challenges we face in making ECLIPSE highly available when running on top of a heterogenous and widely distributed system. We describe how we appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive protocols for survivability of transactions operating on replicated objects

    Publication Year: 2001, Page(s):169 - 176
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    We present a novel transaction model for distributed safety-critical real-time applications in which transactions become increasingly critical under failures of subsequent incarnations. When a transaction-dependent criticality threshold has been reached, the transaction is considered essentially critical or hard, i.e. the deadline has to be met lest the system is doomed to be in a disastrous state... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role-based security for configurable distributed control systems

    Publication Year: 2001, Page(s):111 - 118
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    Although the Common Object Request Broker Architecture (CORBA) simplifies the implementation of complex, distributed systems significantly, the support of techniques for reliable, fault-tolerant, and secure software is very limited. Extensions, such as the CORBAsec specification provide only a limited choice of coarse-grained mechanisms to specify access rights for components. Any fault-tolerance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards universal software substrate for distributed embedded systems

    Publication Year: 2001, Page(s):206 - 213
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    The paper proposes a universal software substrate for building various types of distributed embedded systems. The universal software substrate contains an operating system and several middleware components. It offers a universal application programming interface (Universal API) that greatly increases an embedded application's portability. Also, it makes the development speed of distributed embedde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The emerging real-time standard [UML]

    Publication Year: 2001, Page(s):3 - 9
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    We describe the objectives, rationale and content of the newly proposed real-time Unified Modeling Language (UML) profile standard for the Object Management Group (OMG). The intent of this profile is to enable the inclusion of quantitative temporal information into UML models so that they can be analyzed for key time-related properties such as schedulability and performance. The primary purpose of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia presentation: generic and implementation model

    Publication Year: 2001, Page(s):227 - 232
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    A multimedia presentation is a synchronized, sequential or concurrent, and possibly interactive, delivery of streams of multimedia data such as video, audio, text and still images using audio-video output devices. The first step in realizing a multimedia presentation is to find a position for each media object in space and in time. Resolving space and time positions and switch conditions lead to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic visualization framework to help debug mobile-object-based distributed programs running on large networks

    Publication Year: 2001, Page(s):240 - 247
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    A generic visualization framework (VF) is proposed in this paper with the aim of aiding the debugging of mobile object-based distributed programs running on large networks. This framework consists of three logical layers, namely, the lower public Intranet (PI), the middle visualization data structures (VDS), and the upper visualization user interface (VUI). The VDS makes the VF generic because dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in message passing for a tele-immersive experience

    Publication Year: 2001, Page(s):255 - 260
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Tele-immersion is one of the applications being developed in conjunction with the Internet-2 initiative. Most of the research in this area has focused on issues pertaining to image acquisition and display, tracking technologies, robotics, haptics, etc. In order to maintain consistency of a tele-immersive experience one also needs to develop a suit of solutions that will ensure proper coordination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and analysis of the behavior of GPRS systems

    Publication Year: 2001, Page(s):51 - 58
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    The General Packet Radio Service (GPRS) has recently become a standard to extend the services provided by the Global System for Mobile Communications (GSM). GPRS addresses packet-oriented traffic, by allowing a more efficient usage of the radio resources with a consequent improvement in the quality of service (QoS) for subscribers. This paper focuses on a preliminary evaluation of dependability an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C0PE: Consistent 0-administration Personal Environment

    Publication Year: 2001, Page(s):34 - 40
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    We present an overview of C0PE (Consistent Zero-administration Personal Environment), a project that aims at building an infrastructure for a self-configuring personal environment. The main goals of this project are: (i) to reduce the onus on system administration by allowing distributed devices to be configured automatically, and (ii) to provide a consistent and unified view of the user data from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composing dependable real time software of function blocks

    Publication Year: 2001, Page(s):119 - 126
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    Society increasingly depends on programmable electronic systems in life critical automation systems. Programs employed for purposes of safety related control must be safety licensed, which is a very difficult and hitherto not satisfactorily solved problem. To obtain trustworthy software, it is advocated to employ the principle of divide and conquer, and to orient the design of control systems at t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong replica consistency for fault-tolerant CORBA applications

    Publication Year: 2001, Page(s):10 - 17
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB) | HTML iconHTML

    The Eternal system provides transparent fault tolerance for CORBA applications, without requiring modifications to the application or to the object request broker (ORB), and without requiring special skills of the CORBA application programmers. Eternal maintains strong replica consistency as replicas of objects perform operations, and even as they fail and are recovered. Eternal implements the new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring the cost of scalability and reliability for Internet-based, server-centered applications

    Publication Year: 2001, Page(s):59 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    With large numbers of geographically dispersed clients, a centralized approach to Internet-based application development is not scalable and also not dependable. This paper presents a decentralized approach to dependable Internet-based application development, consisting of a logical structuring of collaborating sub-systems of geographically separated replicated servers. Two implementations of an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Significant Package (ASP): fundamentals of object-oriented architecture modeling for real-time embedded applications

    Publication Year: 2001, Page(s):129 - 136
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Architecture modeling for real-time embedded applications presents a challenging issue in object oriented software development. The paper discusses the architectural modeling concepts and practices through an example of a real-time embedded project. During the project, a practical concept: the Architectural Significant Package (ASP) has been developed. Various ASPS are identified and integrated to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time vs. space in fault-tolerant distributed systems

    Publication Year: 2001, Page(s):21 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Algorithms for solving agreement problems can be classified in two categories: (1) those relying on failure detectors (FDs), which we call FD-based, and (2) those that rely on a group membership service (GMS), which we call GMS-based. This paper discusses the advantages and limitations of these two approaches and proposes an extension to the GMS approach that combines the advantages of both approa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.