352,402 research outputs found

    Implementation of and Ada real-time executive: A case study

    Get PDF
    Current Ada language implementations and runtime environments are immature, unproven and are a key risk area for real-time embedded computer system (ECS). A test-case environment is provided in which the concerns of the real-time, ECS community are addressed. A priority driven executive is selected to be implemented in the Ada programming language. The model selected is representative of real-time executives tailored for embedded systems used missile, spacecraft, and avionics applications. An Ada-based design methodology is utilized, and two designs are considered. The first of these designs requires the use of vendor supplied runtime and tasking support. An alternative high-level design is also considered for an implementation requiring no vendor supplied runtime or tasking support. The former approach is carried through to implementation

    Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems

    Full text link
    We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at fostering the collaboration between system designers and security experts at all methodological stages of the development of an embedded system. A central issue in the design of an embedded system is the definition of the hardware/software partitioning of the architecture of the system, which should take place as early as possible. SysML-Sec aims to extend the relevance of this analysis through the integration of security requirements and threats. In particular, we propose an agile methodology whose aim is to assess early on the impact of the security requirements and of the security mechanisms designed to satisfy them over the safety of the system. Security concerns are captured in a component-centric manner through existing SysML diagrams with only minimal extensions. After the requirements captured are derived into security and cryptographic mechanisms, security properties can be formally verified over this design. To perform the latter, model transformation techniques are implemented in the SysML-Sec toolchain in order to derive a ProVerif specification from the SysML models. An automotive firmware flashing procedure serves as a guiding example throughout our presentation.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    An Adaptive Design Methodology for Reduction of Product Development Risk

    Full text link
    Embedded systems interaction with environment inherently complicates understanding of requirements and their correct implementation. However, product uncertainty is highest during early stages of development. Design verification is an essential step in the development of any system, especially for Embedded System. This paper introduces a novel adaptive design methodology, which incorporates step-wise prototyping and verification. With each adaptive step product-realization level is enhanced while decreasing the level of product uncertainty, thereby reducing the overall costs. The back-bone of this frame-work is the development of Domain Specific Operational (DOP) Model and the associated Verification Instrumentation for Test and Evaluation, developed based on the DOP model. Together they generate functionally valid test-sequence for carrying out prototype evaluation. With the help of a case study 'Multimode Detection Subsystem' the application of this method is sketched. The design methodologies can be compared by defining and computing a generic performance criterion like Average design-cycle Risk. For the case study, by computing Average design-cycle Risk, it is shown that the adaptive method reduces the product development risk for a small increase in the total design cycle time.Comment: 21 pages, 9 figure

    Evaluating architectural stability with real option theory

    Get PDF

    Managing Bias, Partiality, and Dependence in Online Justice Environments.

    Get PDF
    PhD Theses.As Online Dispute Resolution (ODR) begins to enter the wider market, it promises to substantively change the way arbitration works in the justice eco-system. As such, the justice community must determine the fundamental values to be incorporated into the online justice environment so that it can address ethical and regulatory issues in the design of ODR. This thesis is the first attempt of any ODR scholar to identify the fundamental values that must be embedded in the decision making portion of the ODR process. This thesis advocates for the principle of judicial independence and impartiality: decision makers in the arbitration system must be both impartial and independent, without exception, even if the adherence to this rule of law principle conflicts with maximizing the efficiencies of the overall system. As it relates to the decision making process that incorporates technology within the model, technology driven bias must be identified and mitigated against. Consequently, the ODR system must be examined through the lens of risk identification and mitigation principles. This thesis is the first, to examine the ODR model within the technology driven aspects of model design. This thesis examines Rule of Law within the context of decision making in the online justice environment. The thesis argues for adherence to seven rules of action: (1) the rule of law (RoL) must be protected within the online justice environment; (2) an independent and impartial decision maker is an essential RoL principle, such that no departure from the principle should be allowed; (3) it is the method of ensuring the independence and impartiality of the decision maker that is open for greater debate; (4) it is the model design that mitigates dependence and bias; (5) the reduction of negatively impactful bias is the current “best practice” standard; (6) there must be a human within the final step of the technology driven decision making model; (7) accountability is essential as ODR is part of the justice eco-system. The thesis concludes by creating a first of its kind, best practices guidelines with specific examples of risk identification and mitigation principles that must be built into the design

    A Platform-Based Software Design Methodology for Embedded Control Systems: An Agile Toolkit

    No full text
    A discrete control system, with stringent hardware constraints, is effectively an embedded real-time system and hence requires a rigorous methodology to develop the software involved. The development methodology proposed in this paper adapts agile principles and patterns to support the building of embedded control systems, focusing on the issues relating to a system's constraints and safety. Strong unit testing, to ensure correctness, including the satisfaction of timing constraints, is the foundation of the proposed methodology. A platform-based design approach is used to balance costs and time-to-market in relation to performance and functionality constraints. It is concluded that the proposed methodology significantly reduces design time and costs, as well as leading to better software modularity and reliability

    Applying ArchOptions to value the payoff of refactoring

    Get PDF
    ArchOptions is a real-options based model that we have pro-posed to value the flexibility of software architectures in response to future changes in requirements. In this paper, we build on ArchOptions to devise an options-based model, which values the architectural flexibility that results from a refactoring exercise. This value assists in understanding the payoff of investing in refactoring: if the refactored system results in an architecture that is more flexible, such that the expected added value (in the form of options) due to the en-hanced flexibility outweighs the cost of investing in this exer-cise, then refactoring is said to payoff. We apply our model to a refactoring case study from the literature
    corecore