標(biāo)題: Titlebook: Embedded Software; Second International Alberto Sangiovanni-Vincentelli,Joseph Sifakis Conference proceedings 2002 Springer-Verlag Berlin H [打印本頁(yè)] 作者: Abeyance 時(shí)間: 2025-3-21 17:11
書(shū)目名稱Embedded Software影響因子(影響力)
作者: 記成螞蟻 時(shí)間: 2025-3-22 00:00 作者: 溫和女人 時(shí)間: 2025-3-22 00:31 作者: 引起 時(shí)間: 2025-3-22 07:17
A Giotto-Based Helicopter Control System,he Giotto compiler performs a schedulability analysis on the Giotto code, and generates timing code for the helicopter platform. The Giotto methodology guarantees the stringent hard real-time requirements of the autopilot system, and at the same time supports the automation of the software developme作者: HIKE 時(shí)間: 2025-3-22 12:25
Principles of Real-Time Programming,ime programming . that support the development of real-time . based on different abstractions of soft-time. We informally introduce a real-time process model to study (1) the . of the real-time programming models and (2) the . of real-time programs developed in these models.作者: 動(dòng)脈 時(shí)間: 2025-3-22 14:40
Real-Time Virtual Resource: A Timely Abstraction for Embedded Systems,real-time virtual resource abstraction allows tasks with wide-ranging timing criticality to be programmed as if they run on dedicated but slower CPUs such that global knowledge of the tasks is not necessary for schedulability analysis. More importantly, events or signals that are timing sensitive ma作者: 動(dòng)脈 時(shí)間: 2025-3-22 20:58 作者: 長(zhǎng)處 時(shí)間: 2025-3-22 22:20 作者: Intuitive 時(shí)間: 2025-3-23 03:41
Can Behavioral Requirements Be Executed? (And Why Would We Want to Do So?),directly from the system’s GUI, or some abstract version thereof [.], and behavior can then be “played out” freely, adhering to all the requirements [.]. The approach, which is joint with Rami Marelly, is supported and illustrated by a tool we have built - the ..作者: 羅盤(pán) 時(shí)間: 2025-3-23 08:22
Synchronous Modelling of Asynchronous Systems,ynchronous processes can be composed according to various asynchronous models. Common synchronization and communication mechanisms can be described. The resulting descriptions can be simulated and verified, using classical tools of synchronous programming.作者: HARP 時(shí)間: 2025-3-23 12:24 作者: gait-cycle 時(shí)間: 2025-3-23 17:38
Speedup Prediction for Selective Compilation of Embedded Java Programs,We propose a profile based code selection scheme for an AOT Java compiler. This scheme relies on a model that accurately predicts the speedup of a given selection. The model takes into account the cross-call patterns of the application. This approach allows us to reduce the size of compiled code significantly for several benchmarks.作者: Graves’-disease 時(shí)間: 2025-3-23 18:16 作者: Axon895 時(shí)間: 2025-3-24 00:42 作者: 我正派 時(shí)間: 2025-3-24 03:57
Auswertung und Darstellung der Ergebnisse, to achieve high confidence in safety requires considering it from the start of system development and designing the software to reduce the potential for hazardous behavior. An approach to building safety into embedded software will be described that integrates system hazard analysis, user task anal作者: GLIB 時(shí)間: 2025-3-24 09:48
Assessing Cognition in Movement Disordersdirectly from the system’s GUI, or some abstract version thereof [.], and behavior can then be “played out” freely, adhering to all the requirements [.]. The approach, which is joint with Rami Marelly, is supported and illustrated by a tool we have built - the ..作者: Infect 時(shí)間: 2025-3-24 12:17
Month of Birth and Gametopathy,on the principles of platform-based design, which uses layers of abstraction to isolate applications from low-level system details and yet provides enough information about the important parameters of the lower layers of abstraction, to modularize the system design and to provide predictable system 作者: 蕨類 時(shí)間: 2025-3-24 18:26 作者: 啪心兒跳動(dòng) 時(shí)間: 2025-3-24 22:14
https://doi.org/10.34156/978-3-7910-6156-6ammers is to unlock the virtually unlimited potential of software for embedded computer systems - digital computers that are supposed to behave like analog devices. The perfect embedded computer system is invisibly hybrid, it works according to the largely unidentified laws of embedded software but 作者: 使習(xí)慣于 時(shí)間: 2025-3-25 02:29 作者: receptors 時(shí)間: 2025-3-25 06:08 作者: enormous 時(shí)間: 2025-3-25 09:33
Wirksamkeit des Mentalen Trainings outputs it can produce. Two timed interfaces are . if there is a way to use them together such that their timing expectations are met. Our theory provides algorithms for checking the compatibility between two interfaces and for deriving the composite interface; the theory can thus be viewed as a ty作者: Decimate 時(shí)間: 2025-3-25 15:05
Mentales Training im Leistungssporteral and longitudinal control of a set of vehicles traveling in a . formation at close distance and at high speeds [.]. The software architecture consists of a set of processes running concurrently and communicating through a . database. Some processes are triggered periodically by external inputs (作者: GUISE 時(shí)間: 2025-3-25 18:10
https://doi.org/10.1007/978-3-662-46819-7e execution of these applications must be scheduled so that they do not inadvertently consume CPU time that has been budgeted for other applications. This scheduling function may be performed by a real-time operating system (RTOS) that provides time partitioning guarantees. The large number of varia作者: 搖曳的微光 時(shí)間: 2025-3-25 20:43
Ergebnisdarstellung und -interpretation,n such a way, the performance of a system can be degraded to achieve a longer battery duration, or it can be increased when the battery level is high. Unfortunately, however, in the presence of timing and resource constraints, the performance of a real-time system does not always improve as the spee作者: 俗艷 時(shí)間: 2025-3-26 00:31
Schlussfolgerungen aus den Ergebnissen,ed in roads, bridges, buildings and vehicles tend to have a long life cycle. Application needs will change and computing, communication and control technologies willevolve rapidly. To keep systems modern, we need technologies to dependably and securely upgrade embedded software in the field. This pa作者: 昆蟲(chóng) 時(shí)間: 2025-3-26 06:23 作者: 單調(diào)性 時(shí)間: 2025-3-26 11:40
Die Systematik unseres Wirkens,slow and one would like to compile bytecode into native code as this is achieved in JIT compilers on desktops. Our approach takes into account the memory and CPU constraints of the appliances. We have designed a distributed technology to efficiently detect “hot spots” of the application and compile 作者: euphoria 時(shí)間: 2025-3-26 16:17 作者: 膝蓋 時(shí)間: 2025-3-26 19:57 作者: 人工制品 時(shí)間: 2025-3-26 23:25
Identifying and Influencing Key Stakeholdersggered Architectures (LTTA) are a weaker form of the strictly synchronous Time-Triggered Architecture proposed by Kopetz, in which the different periodic clocks are not synchronized, and thus may suffer from relative offset or jitter..We propose a protocol that ensures a coherent system of logical c作者: Atrium 時(shí)間: 2025-3-27 01:49 作者: Commemorate 時(shí)間: 2025-3-27 05:24 作者: inculpate 時(shí)間: 2025-3-27 09:54 作者: graphy 時(shí)間: 2025-3-27 16:16
Embedded Software978-3-540-45828-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 勉強(qiáng) 時(shí)間: 2025-3-27 19:22 作者: foreign 時(shí)間: 2025-3-28 01:27
An Approach to Designing Safe Embedded Software,ysis, traceability, and informal specifications combined with executable and analyzable models. The approach has been shown to be feasible and practical by applying it to complex systems experimentally and by its use on real projects.作者: 永久 時(shí)間: 2025-3-28 06:03 作者: Defraud 時(shí)間: 2025-3-28 10:17
Timed Interfaces,pe system for real-time interaction. Technically, a timed interface is encoded as a timed game between two players, representing the inputs and outputs of the component. The algorithms for compatibility checking and interface composition are thus derived from algorithms for solving timed games.作者: Grating 時(shí)間: 2025-3-28 14:08 作者: 高度 時(shí)間: 2025-3-28 16:35 作者: acheon 時(shí)間: 2025-3-28 19:51
JCOD: A Lightweight Modular Compilation Technology for Embedded Java,them out of the appliance, on a network compile server that uses a lot of code size optimizations. This paper describes the different components and exhibits their flexibility. They can easily be upgraded independently or tailored for a specific kind of applications running on a given appliance.作者: 不來(lái) 時(shí)間: 2025-3-29 02:43
A Protocol for Loosely Time-Triggered Architectures,locks on the top of LTTA, and we provide several proofs for it, both manual and automatic, based on synchronous languages and associated model checkers. We briefly discuss how this can be used for correct deployment of synchronous designs on an LTTA.作者: GAVEL 時(shí)間: 2025-3-29 04:06 作者: 背叛者 時(shí)間: 2025-3-29 08:38 作者: chemoprevention 時(shí)間: 2025-3-29 14:01 作者: 一起 時(shí)間: 2025-3-29 17:00
Decreasing Memory Overhead in Hard Real-Time Garbage Collection,l memory can be used to store live objects. This should be compared to a memory overhead of about 500% for garbage collectors based on copying techniques and about 50% for garbage collectors based on mark-and-sweep techniques.作者: Annotate 時(shí)間: 2025-3-29 23:02
https://doi.org/10.1007/978-94-007-5195-8e distribution and allocation..As a prototype example of such a development process, we quote some experiences from the . project and its follow-up . Necessary extensions to these preliminary experiments are discussed and evaluated.作者: 散開(kāi) 時(shí)間: 2025-3-30 03:25
Procedure van individuele mentale training,es a schedulability analysis. We show that while for arbitrary E code, the analysis is exponential, for E code generated from typical Giotto programs, the analysis is polynomial. This supports our claim that Giotto identifies a useful fragment of embedded programs.作者: 補(bǔ)充 時(shí)間: 2025-3-30 04:58 作者: 古文字學(xué) 時(shí)間: 2025-3-30 11:11 作者: 彎曲道理 時(shí)間: 2025-3-30 12:44 作者: HEW 時(shí)間: 2025-3-30 17:31 作者: Indebted 時(shí)間: 2025-3-30 21:24
Formal Modeling and Analysis of Advanced Scheduling Features in an Avionics RTOS,on our efforts to use model checking techniques to verify time partitioning properties in an avionics RTOS. Our modeling and analysis is based on the actual embedded software so as to capture the implementation details of the scheduler. We focus here on several advanced scheduling features of the RTOS that are particularly challenging to verify.作者: Adornment 時(shí)間: 2025-3-31 03:39
Scalable Applications for Energy-Aware Processors,..This paper presents the potential problems that may arise in a voltage-controlled real-time system and proposes an approach that allows to develop real-time applications, whose performance can be scaled in a controlled fashion as a function of the processor speed.作者: Acetaldehyde 時(shí)間: 2025-3-31 07:13 作者: 儲(chǔ)備 時(shí)間: 2025-3-31 11:04 作者: superfluous 時(shí)間: 2025-3-31 17:20 作者: animated 時(shí)間: 2025-3-31 18:55
Mentales Training im Leistungssporte.g., from sensors) while others are triggered by events from other (internal) processes. We model the architecture as a set of periodic . each consisting of a sequence of . with varying priorities [.,.]. We perform a schedulability analysis to check whether a set of timing requirements expressed as . are met.作者: 保全 時(shí)間: 2025-3-31 23:22
Schlussfolgerungen aus den Ergebnissen,per provides a review of our work on how to upgrade embedded control systems without shutting them down, and how to protect the system from bugs and attacks that could be introduced by software upgrades.作者: 原來(lái) 時(shí)間: 2025-4-1 02:31 作者: 兩棲動(dòng)物 時(shí)間: 2025-4-1 06:04 作者: Stress-Fracture 時(shí)間: 2025-4-1 12:01 作者: Postmenopause 時(shí)間: 2025-4-1 16:56
An Approach to Designing Safe Embedded Software, to achieve high confidence in safety requires considering it from the start of system development and designing the software to reduce the potential for hazardous behavior. An approach to building safety into embedded software will be described that integrates system hazard analysis, user task anal作者: refraction 時(shí)間: 2025-4-1 20:04