Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (WORDS 2002)

9-9 Jan. 2002

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (WORDS 2002)

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (404 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 361
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Writing temporally predictable code

    Publication Year: 2002, Page(s):85 - 91
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The Worst-Case Execution-Time Analysis (WCET Analysis) of program code for modern processors is a highly complex tasks: First, it involves path analysis, to identify and describe the possible execution paths through the code. Second, it models the worst-case timing of possible paths on the target hardware, where the characterization of the timing of sophisticated hardware features (e.g., instructi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A static timing analysis environment using Java architecture for safety critical real-time systems

    Publication Year: 2002, Page(s):77 - 84
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Certainly, in hard real-time systems, it is reasonable to argue that no hard real-time threads should behave in an unpredictable way and that schedulability should be guaranteed before execution. In order to guarantee the timing constraints of portable code for hard real-time applications, a particular static timing analysis is necessary. In this paper, we provide a static timing analysis environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eliciting and specifying requirements with use cases for embedded systems

    Publication Year: 2002, Page(s):350 - 357
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    This paper proposes enhancements to the use case technique for eliciting and specifying requirements for embedded systems. The work resulted from the employment of the use case technique for the requirements elicitation and specification of embedded systems in an industrial context. The use case technique is currently considered the state-of-the-art for handling requirements, because of the many b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jini meets embedded control networking: a case study in portability failure

    Publication Year: 2002, Page(s):11 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    The Robust Self-Configuring Embedded Systems (RoSES) project seeks to achieve graceful degradation through software reconfiguration. To accomplish this goal, systems must automatically reconfigure despite nodes failing, being replaced by inexact spares, or being upgraded. Jini seemed to provide the required spontaneous networking infrastructure, but turned out to make deep assumptions about using ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object testing in ITEE

    Publication Year: 2002, Page(s):245 - 252
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    To assure the quality of software by running test cases and evaluating the results is one of the difficult parts of the entire software development project. The difficulty usually comes from the lack of appropriate supporting tools and the complexity of the software. In the past ad hoc supporting tools were made for each project and test results were usually not used across projects. This conventi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology challenges for building Internet-scale ubiquitous computing

    Publication Year: 2002, Page(s):171 - 179
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    In the future, many of the physical objects that surround us will be augmented with microprocessors and wireless transceivers. They will communicate with each other, quietly monitor our daily activities and notify us of important events. Any piece of relevant information on the Internet will be available to us anytime and anywhere. We call this scenario the Internet-scale ubiquitous computing envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Worst case execution time analysis of object-oriented programs

    Publication Year: 2002, Page(s):71 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Object-oriented programming languages are extensively used in real-time systems. However, calculating the Worst Case Execution Time (WCET) for object-oriented programs poses additional challenges as compared to imperative programming languages. This paper describes these additional problems and how they have been tackled in the research community. The paper also gives an overview of state-of-the-a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfiguration of resources in middleware

    Publication Year: 2002, Page(s):219 - 226
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    The monolithic and inflexible nature of current middleware, has made it difficult to deal with emerging technologies such as multimedia. We believe that reflection provides a principled means to achieve the flexibility and adaptation required The main focus of this paper regards the reconfiguration of resources in middleware within the context of OpenORB, a reflective middleware architecture. A re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of object-oriented design to Knowledge Amplification by Structured Expert Randomization (KASER)

    Publication Year: 2002, Page(s):343 - 349
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    This paper presents research results of a project that produced a progressively dependable knowledge amplifier. A knowledge amplifier can acquire a virtual-rule space automatically that is exponentially larger than the actual, declared-rule space and with a decreasing non-zero likelihood of error. A Knowledge Amplifier by Systematic Expert Randomization (KASER) overcomes the knowledge-acquisition ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meta-programming techniques for distributed real-time and embedded systems

    Publication Year: 2002, Page(s):3 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    This paper provides two contributions to the study of mechanisms for reducing the life-cycle costs of distributed real-time and embedded (DRE) systems. First, we present a mechanism-called a Quality Connector-that enables applications to specify the qualities of service that they require from their infrastructure, and then manages the operations that optimize the middleware to implement those requ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving interaction-prone scenarios in feature interaction filtering with use case maps

    Publication Year: 2002, Page(s):237 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Feature interactions (FIs) occur when features of different communication services interfere with each other FI filtering is a pre-processing step before the FI detection, which roughly identifies FI-prone service combinations based on simple indications of the FIs. We have previously (Proc. 6th Intl. Workshop on Feature Interactions in Telecom. Networks and Distributed Systems, pp. 163-178, 2000)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configurable services for mobile users

    Publication Year: 2002, Page(s):163 - 170
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Mobile devices, such as cellular phones, personal digital assistants (PDAs), and organizers, are becoming increasingly popular. Due to the high volatility of those devices, the achievable quality-of-service (QoS) for mobile services can hardly be predicted. Even for one particular type of device - say a PDA - the implementation of a mobile service may use different communication interfaces over ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable group membership service for mobile Internet

    Publication Year: 2002, Page(s):295 - 298
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Group communication system (GCS) is a useful mechanism for constructing reliable, fault-tolerant distributed application. When GCS is extended in mobile environment, the membership change occurs frequently due to the mobility of mobile nodes and unreliable wireless communication within a cell. In this paper, we propose a scalable group communication scheme to support mobile systems in an Internet ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling FT-CORBA compliant interoperable object group references

    Publication Year: 2002, Page(s):37 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    The handling of Interoperable Object Group References (IOGRs) is one of the basic building block of any FT-CORBA compliant platform. In this paper we introduce two basic components: IOGRManager, a tool to create, update, browse IOGRs, and an Outgoing-Request-Gate Way (ORGW), a CORBA compliant client request interceptor, which allows clients running on non-FT-CORBA compliant ORBs to transparently i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FTS: a high-performance CORBA fault-tolerance service

    Publication Year: 2002, Page(s):61 - 68
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    This paper presents a lightweight CORBA fault-tolerance service called FTS. The service is based on standard portable features of CORBA, and in that respect is fully CORBA compliant, but does not follow the FT-CORBA specifications in areas where the authors felt the latter interfered with their other design goals. The service features a unique architecture, based on a new type of an object adaptor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenario-based implementation architecture for real-time object-oriented models

    Publication Year: 2002, Page(s):147 - 152
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    This paper presents a scenario-based implementation architecture supporting a method capable of automatically mapping real-time object-oriented models into multi-threaded implementations. To implement the synthesis tool supporting the method, we exploit existing CASE tools that support the object-based implementation architecture. Challenges in our approach are (1) how to embed our implementation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a probabilistic replica selection algorithm

    Publication Year: 2002, Page(s):119 - 127
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    When executing time-sensitive distributed applications, a middleware that provides dependability and timeliness is faced with the important problem of preventing timing failures both under normal conditions and when the quality of service is degraded due to replica failures and transient overload on the server. To address this problem, we have designed a probabilistic model-based replica selection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended object composition model for distributed multimedia services

    Publication Year: 2002, Page(s):279 - 286
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    In this paper, we present an object-oriented multimedia data processing model to support a wide variety of applications requiring network-transparent accesses to stored multimedia data, real-time multimedia input devices, and multimedia processing components. Most multimedia solutions address the problem of authoring, storing, and downloading hypermedia data. But these solutions fall short in supp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed object-oriented real-time simulation of the multicast protocol RFRM

    Publication Year: 2002, Page(s):215 - 218
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    A real-time fault-tolerant multicast protocol is necessary for obtaining high performance in operating distributed real-time computing systems. This paper shows the efficiency of the RFRM (Release-time based Fault-tolerant Real-time Multicasting) protocol, which is based on the idea of attaching the official release time to each multicast message. As a part of this, a real-time simulation based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheduling technique providing a strict isolation of real-time threads

    Publication Year: 2002, Page(s):334 - 340
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Highly dynamic programming environments for embedded real-time systems require a strict isolation of real-time threads from each other to achieve dependable systems. We propose a new real-time scheduling technique, called guaranteed percentage (GP) scheme that assigns each thread a specific percentage of the processor power. A hardware scheduler in conjunction with a multithreaded processor guaran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auction system design using open multithreaded transactions

    Publication Year: 2002, Page(s):95 - 104
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Open Multithreaded Transactions form an advanced transaction model that provides features for controlling and structuring not only accesses to objects, as usual in transaction systems, but also threads taking part in transactions. The model allows several threads to enter the same transaction in order to perform a joint activity. It provides a flexible way of manipulating threads executing inside ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GUI approach to programming of TMO frames

    Publication Year: 2002, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    While improved methods for engineering highly reliable distributed real-time embedded-computing (DRE) systems appear regularly these days, challenging issues still exist for easy programming such application systems that offer sufficient reliability. A concrete approach formulated by the first co-author together with his research collaborators is called the TMO (Time-triggered Message-triggered Ob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenario-based modeling and its applications

    Publication Year: 2002, Page(s):253 - 260
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Use-oriented techniques are widely used in software requirement analysis and design. Use cases and usage scenarios facilitate system understanding and provide a common language for communication. This paper presents a scenario-based modeling technique and discusses its applications. In this model, scenarios are organized hierarchically and they capture the system functionality at various abstracti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.