Model-Based Synthesis of Fault Trees from Matlab - Simulink models

Size: px
Start display at page:

Download "Model-Based Synthesis of Fault Trees from Matlab - Simulink models"

Transcription

1 Model-Based Synthesis of Fault Trees from Matlab - Simulink models Yiannis Papadopoulos, Department of Computer Science, University of York, York YO10 5DD, UK yiannis@cs.york.ac.uk Matthias Maruhn DaimlerChrysler AG, Research and Technology, Alt Moabit 96a, D-10559, Berlin, Germany Matthias.Maruhn@DaimlerChrysler.com Abstract In this paper, we outline a new approach to safety analysis in which concepts of computer HAZOP are fused with the idea of software fault tree analysis to enable a continuous assessment of an evolving programmable design developed in Matlab-Simulink. We also discuss the architecture of a tool that we have developed to support the new method and enable its application in complex environments. We show that the method and the tool enable the integrated hardware and software analysis of a programmable system and that in the course of that analysis they automate and simplify the development of fault trees for the system. Finally, we propose a demonstration of the method and the tool and we outline the experimental platform and aims of that demonstration. 1. Introduction The processing abilities, relative low cost, speed and flexibility of modern computers are currently leading a number of safety related industries (railways and automobiles, for example) to an almost inevitable transition towards programmable systems. As this transition gradually takes place, there is clearly a need to ensure that new critical systems introduced in those industries will deliver safety-related services with at least the degree of reliability that similar services have been delivered by conventional systems in the past. Naturally, safety assessment processes evolve to deal with changes in the technology of safety critical systems. A number of international safety-related standards are emerging, for example, which define rigorous development and assessment life-cycles in which hazard and safety analysis occupy a central position. But although safety assessment is increasingly being recognised as an important component of the software life-cycle, on the other hand very little guidance exists on precisely how and when to do it in programmable systems. This, we believe, can largely be attributed to the lack of mature techniques for software hazard and safety analysis. Recent efforts to apply modifications of classical safety analysis techniques such as Hazard and Operability studies (HAZOP) and fault tree analysis on software and programmable systems have not yet achieved the degree of maturity that would enable their successful application in complex systems. In most variants of computer HAZOP [1-3], for example, the analysis remains a predominantly manual activity as it would have been in a classical process HAZOP performed at plant level. As systems become more complex though, manually performed analyses become tedious, error prone, timeconsuming and beyond a certain level of complexity practically infeasible. To overcome this problem, other techniques, such as the Leveson template approach to software fault tree analysis [4], introduce a useful degree of automation in the assessment of software. Despite some theoretical contributions to the problem though, no technique has yet found widespread application in complex environments. In many cases, this is due to a lack of appropriate accompanying concepts for tool support that could enable the practical evaluation of those techniques in realistic contexts of application. In this paper, we outline a new method for safety analysis in which concepts of computer HAZOP are fused with the idea of software fault tree analysis [5-6]. The aim is to create a technique that could enable a continuous assessment of an evolving programmable design that starts at the early stages of the design lifecycle. As we will show, the method potentially automates and simplifies the development of fault trees for a programmable system. However, robust tool support is required to realise this potential for automation. In this paper, we therefore discuss the underlying principles and architecture of a tool that we have developed to support the method and enable its application in complex environments.

2 System Model Safety Analysis Automatic Synthesis high-level system architecture Fault Tree Synthesis Algorithm sub-systems Automatically generated Fault Trees for the system Figure 1. Overview of Modeling and Safety Analysis HAZOP style analyses of composite and basic elements in the Model The tool assists a continuous HAZOP style analysis of a programmable system. This analysis is performed on a model of the system that is being developed in Matlab/Simulink, a well known modelling and simulation environment 1. At each stage in the development of that model, the tool can mechanically determine the failure behaviour of the system as a set of fault trees that define potential scenarios of failure and recovery. These fault trees show whether component failures are stopped by the present error detection and recovery mechanisms in the system or if they propagate through system processes and cause critical functional failures of the system. Analysis of those fault trees helps to eventually establish whether the current design satisfies the given safety requirements or to identify weak areas of the design and stimulate useful design revisions. In sections two and three of this paper we outline this approach to safety analysis and the architecture of the tool respectively, while in section four, we discuss our plans 1 We must point out that the method is not only applicable on Simulink models but more generally on models that record the hierarchical structure of the system and dependencies between components of the architecture on material, energy or data. However, the reason that we have chosen Simulink as a modelling environment is that Simulink models already exist in practice and play a useful role in the design of programmable systems. At the early stages of design, for example, such models help to define and validate through simulation the functional structure of the system. At later stages, they provide a basis for modelling non-functional properties (temporal behaviour, for example) as well as for the automatic generation of code that can be usefully employed in the actual implementation of the system. But, if Simulink models already provide a useful resource in the design of the system, why not use those models as a basis for our approach to the safety analysis of a programmable system? on how to demonstrate, through the tool, the validity and scalability of our approach. Our plans for demonstration are based on a case study that we currently perform on a prototypical distributed brake-by-wire and adaptive cruise control system for cars, a system which is currently developed by a consortium of automotive companies in the context of a European Commission funded project called SETTA 2 (Systems Engineering for Time-Triggered Architectures). 2. Modelling and Safety Analysis Figure 1 provides an overview of the relationship between modelling and safety analysis in the proposed approach. The left hand side of the figure shows the model that provides the basis for the analysis of the system. This model describes the hierarchical decomposition of the system into composite and basic elements that communicate through material energy or data flows. At the early stages of the design, this model is typically an abstract representation that provides a purely functional description of the system. Composite elements of the model at this stage typically represent functions that are decomposed into networks of lower level subfunctions. As the model is enriched with architectural information about the allocation of functions to hardware, composite elements in the model start to represent programmable entities, processors for example enclosing the tasks running on those processors. While this 2 IST contract number The SETTA consortium consists of the following partners: DaimlerChrysler, Renault, Siemens, Alcatel Austria, EADS Airbus, Dependable Computer Systems, TTTech, University of York, Technical University of Vienna.

3 decomposition process evolves, the model always remains a consistent hierarchical representation of the system that progressively records with increasing detail the implementation of the system. To analyse this model at a particular stage of the design, the failure behaviour of each component in the model has to be determined using a form of computer HAZOP. During the application of this technique on a component, each output of the component is systematically examined for potential deviations from the intended normal behaviour. The specific failure modes of each output are determined as the behaviour of the output is scrutinised for potential deviations that may fall in one of the following three categories of failure: (A) service provision failures such as the omission or commission of the output; (B) timing failures such as the early or late delivery of the output; (C) failures in the value domain such as the output value being out of range, stuck, biased, exhibiting a linear or non-linear drift or erratic behaviour. The result of the analysis is a model of the local failure behaviour of the component under examination. This model is represented as a table and provides a list of component failure modes as they can be observed at the component outputs (see figure 2 for an example). For each identified output failure the analysis determines the causes of that failure in logical expressions that contain internal malfunctions of the component (see Component Malfunction Logic column in table of figure 2) or deviations of the component inputs (see Input Deviation Logic column in figure 2). For each internal malfunction, an estimated or experimentally derived failure rate (λ) can also be specified, and later be used for reliability evaluation purposes. One important attribute of that analysis is its local nature. Indeed the analysis is always confined within the component I/O interface, a characteristic which renders the results re-usable in the same application or even across different applications, perhaps after some minor modifications to reflect the effect of a different environment. A second important attribute of the technique is that, during the analysis, designers and analysts are encouraged to examine the interactions of the component with other components in its periphery. Two important questions, for example, are typically addressed. a) Does the component under examination respond to all the failures propagated by other components further upstream in the model? b) Are the failures generated or propagated by the component under examination handled by other components further downstream? By addressing such questions, the analysis effectively assists the systematic improvement of the failure detection and recovery mechanisms in the system. At the early stages of the design, for example, the global application of the technique can help analysts identify hazardous functional dependencies such as those caused by shared material, energy or data flows between different functions. Such dependencies also include cascading cause-effect relationships through which, an initial functional failure causes one or more undesirable functional failures further downstream in the model. Although the early identification of such dependencies is helpful, we must also point out that the hazard analysis of a model can only be complete when information about resource allocation and the architecture of the system has been added to that model. It is only then, for example, that the analysis can capture hazardous dependencies between (seemingly independent) functions that can be caused by shared architectural resources (e.g. processors) in the system. One issue that it is worth exploring further at this point is the application of that technique on programmable components. Indeed, it is perhaps easy to imagine how this type of hazard analysis could be performed on hardware components such as sensors and actuators (also more details on the basic application of this technique and a case study can be found in [5]). What happens, though, when the object of the analysis is a Other components further upstream in the model input_1 input_2 output Other components further downstream in the model Component Examined Output Failure Mode Description Input Deviation Logic Component Malfunction Logic λ(f/h) Omission-output The component fails to generate the output Omission-input_1 AND Omission-input_2 Jammed OR Short_circuited 5x10-7 6x10-6 Wrong-output The component generates wrong output Wrong-input_1 OR Wrong-input_2 Biased 6x10-8 Early-output Early output Figure 2. Hypothetical component and hazard analysis

4 controller implemented as a number of tasks running on some programmable hardware? How could we determine the local failure behaviour of that component and how could we take into account the contribution of both hardware and software in this type of hazard analysis? Figure 3 illustrates a general concept for the representation and analysis of programmable hardware. The figure shows a programmable component modelled as a composite element that encapsulates a network of software modules (tasks). The hazard analysis of such a component could be performed as follows. At the level where the component is represented as a composite element (higher level in the model), we examine and record the direct effect of hardware failures to the outputs of the component. This makes sense, since hardware is typically a common resource shared by all the functional (software) modules of the component, and therefore, a hardware failure will typically impact all software modules. A failure of a processor, for example, will often cause an omission of all the outputs of a controller. It therefore makes sense to examine hardware failures separately, and in a direct and collective fashion. At the level where the functional structure of the component is described (lower level in the model) we perform a hazard analysis of each task using the same technique that we have described in this section. The analysis at this level records how each task responds to omission, commission, timing or value failures propagated by other tasks. Also, how possible internal logical defects in the implementation of each task could affect the outputs of the task. Collectively, the analyses of all tasks show how the software of the controller responds to failures arriving at the controller inputs and how input failures or possible logical errors in the design of that software may propagate and ultimately corrupt the controller outputs. It is important to point out that the concept that we propose in figure 3 can in practice also be used for the analysis of other types of dependencies. If, for example, the enclosing component in figure 3 lies in an environment where there is excessive electromagnetic interference, then all the enclosed components are susceptible to this hazard. It makes sense therefore to determine the effect of this condition at the level of the enclosing component. Also, in a similar way we can determine the effects of other types of spatial or environmental dependencies that are not caused by shared material, energy or data flows that are explicitly represented in the model of the system. The concept of figure 3, thus, provides a general mechanism for the representation and cause-effect analysis of common cause failures. Let us point out though, that the identification of the root causes of such failures in the design, manufacturing and operating processes of the system, as well as their quantitative analysis, require substantial additional modelling which is currently out of the scope of this work. This approach to hazard analysis also lacks mechanisms for the representation and handling of data dependencies, conditions in which erroneous effects appear only in response to certain (but not all) input conditions. Consider, for example, a data register in which we store and retrieve values, and imagine that the least significant bit of that register is stuck at 0. All odd numbers that we attempt to store in the register will be corrupted, but the fault will not affect any of the even numbers. Clearly, a value failure will be observed at the output of the register but only for a subset of input values. Using the proposed approach, we could only pessimistically declare that a value failure can be caused by a stuck at zero failure in one or more bits of the register. But to represent the data dependent manifestation of failure in those circumstances, we would clearly need a much more elaborate and complex failure expression. Perhaps an alternative way of dealing with this problem would be to enable a form of non-deterministic modelling Model Safety Analysis Controller (hardware ) upon which the enclosed tasks are running Hardware Analysis This table shows how failures of the hardware affect the outputs of the controller Task Analyses Tasks (their interdependencies and how they handle data arriving at the controller inputs) Each table shows how the given task responds to invalid data arriving at the task inputs and how internal defects in the logic may affect the task outputs All together, the task analyses show how the software responds to failures arriving at the controller inputs and how logical errors in the software may propagate and ultimately affect the controller outputs Figure 3. A concept for the representation and hazard analysis of programmable hardware

5 in which uncertainty can exist in the relationship between malfunctions and their effects (see, for instance, the use of unknown values in multi-valued logic approaches as, for example, demonstrated in [7]). Leaving those issues for further work, however, let us now assume that at a given stage of the design, the local hazard analysis of all components in the model has been performed and that the model has been annotated with the results from this analysis. At this point we can move from local analysis to global analysis, in other words we can determine the global propagation of failure in the system using the local analyses of its components. In the proposed method, this is actually achieved mechanically using an algorithm that we have developed for the automatic synthesis of fault trees. The algorithm generates fault trees for hazardous functional failures as these can be observed at outputs of the system, by traversing the hierarchical model of the system and by following the propagation of failure backwards from the final elements of the design (actuators) towards the system inputs (sensors). In the course of this traversal, the algorithm identifies and records in the structure of those fault trees hazardous dependencies between components in the model caused by shared material, energy or data flows. It also takes into account any environmental or functional dependencies (between sub-systems and components) that have been recorded in the vertical axis of the hierarchy. By placing those dependencies in the context of a global view of failure in the system, the algorithm performs an important function. It help us to identify particularly hazardous dependencies between components that we assume to be independent but they are in fact susceptible to common cause failure. The resultant fault trees can, therefore, help us to identify hazardous dependencies between replicated components in fault tolerant architectures. The analysis of those fault trees (cut-set analysis, for example) can also help to eventually establish whether the current design satisfies the given safety requirements or to identify weak areas of the system that need to be redesigned. Currently, such design iterations create enormous difficulties in the maintenance of large manually constructed fault trees. In contrast, design iterations would not pose problems to the proposed synthesis of the fault trees, as new fault trees could be automatically re-constructed following of course certain changes in the model and the underlying hazard analyses. 3. Tool design At this point, let us move to the design of the tool that we have developed to support the application of this approach to safety analysis. The aim of this tool is to integrate the proposed method, and the fault tree synthesis algorithm, in an environment of already established industrial tools that consists of a popular functional modelling tool (Simulink, from Mathworks) and a popular fault tree analysis tool (Fault Tree Plus, from Isograph). Figure 4 illustrates the main components of the fault tree synthesis tool and the relationships of those components with Simulink and Fault Tree Plus. The first important observation is that the tool does not have independent modelling capabilities. Indeed, the tool exploits models of the system that have been created in Simulink during functional design. An investigation of those models has shown that Simulink models can provide directly one of the two ingredients that we need for the automatic synthesis of fault trees, the topology of the system (i.e. the components of the system, their hierarchical relationships & architectural dependencies). At the same time, though, Simulink models lack the second ingredient required by the synthesis algorithm, namely they lack any information about the local failure behaviour of the basic components of the system. To remedy this problem, we have extended Simulink with an editor that enables analysts to annotate functional models with failure information represented in the form of the hazard analysis that we introduced in the preceding SIMULINK Modelling tool System Model Hazard analysis editor (SIMULINK extension) Automated Safety Analysis Tool Annotated model as text file Parser Annotated model in data structure Fault Tree Synthesis Algorithm Synthesised fault trees FAULT TREE + Fault Tree Analysis Tool Figure 4. Architecture of the Tool

6 section. This editor has been built as an extension of Simulink, using the application programming interface (scripting language) of that tool. Once a Simulink model has been annotated with the local hazard analyses of its components, it is then exported from Simulink as a text file that conforms to a particular syntax. The second component of the safety analysis tool is a parser that can analyse such files, i.e. files that conform to the grammar of Simulink models. This component performs syntactical analysis and interpretation of the model file, and regenerates (in the memory of the computer) the model and the data structures required for the fault tree synthesis. Finally the fault tree synthesis itself is performed by the third component of the tool, the fault tree synthesis algorithm. To generate the trees, the algorithm performs a backward traversal of the model, in the course of which it evaluates the failure expressions contained in the local analyses of the components encountered during the traversal. The resultant fault trees are written in the binary format of a Fault Tree Plus project file and can be imported in that tool for further analysis and reliability evaluation purposes. It is perhaps important to point out that there are no restrictions imposed on the size of the model or on the type of components that could be used for the development of the model. The safety analysis tool, for example, can handle the complications caused in the traversal of the model and the fault tree synthesis by the multiplexing and de-multiplexing of flows that often exists in realistic models. It can also recognise and handle indirectly relayed control signals (triggers) and components that are not connected through explicit links, but communicate remotely using implicit communication protocols (Data-store/Data-read pairs, for example). We hope that such features will help to deal with realistic models and render the tool useful in industrial contexts of application in the future. 4. Demonstration Plan The following paragraph summarises the three aims of our demonstration at the conference. Firstly, we wish to show an example of how the proposed approach can be used for integrated hardware and software safety analysis in a programmable system. Secondly, we wish to demonstrate the applicability of the proposed approach on complex problems. Our aim, for example, will be to show how, in practice, the tool can operate on a complex Simulink model and synthesise a large fault tree. Finally, we wish to show how this approach can assist the design and simplify the assessment of the system. To achieve this we intend to demonstrate how the synthesised fault trees can point out weak areas of the design. Also, how automatic fault tree synthesis simplifies the re-analysis of a system following a design iteration. The system that we have chosen as a suitable basis for the demonstration is a prototypical brake-by wire and adaptive cruise control system for cars. This system is currently being developed by a consortium of automotive industries in the context of a European Commission funded project called SETTA [8]. The brake-by-wire system is based on a brake pedal provided by Daimler Chrysler and a brake actuator provided by Siemens Automotive, while the adaptive cruise control system is an executable model of vehicle dynamics provided by Renault. The three components of that system run on an equal number of programmable nodes which communicate over two replicated busses using a deterministic time-triggered communication protocol. The overall architecture is safety critical and contains two distributed control loops with strict timing requirements. For the conference demonstration, we plan to develop an executable Simulink model for that system and annotate that model with local hazard analyses. We will then use our safety analysis tool to generate a set of fault trees for the system and import those fault trees in Fault Tree Plus for further Analysis and Reliability Evaluation. We hope that the demonstration of this process and the results from the analysis of the resultant fault trees will help us substantiate some of the claims that we have made in this paper and to achieve the aims that we have set out in the beginning of this section. 5. References [1] Burns D.J., Pitblado R.M., A modified HAZOP methodology for Safety Critical System Assessment, 7 th meeting of the UK Safety Critical Club, Bristol, February [2] McDermid J.A., Pumfrey D.J., A Development of Hazard Analysis to Aid Software Design, COMPASS 94, Gaithersburg MD, IEEE Computer Society Press, [3]Yang S., Chung P.W.H., Hazard Analysis and Support Tool for Computer Controlled Processes, Journal of Loss Prevention in the Process Industries, 11: , [4] Leveson N., Cha S.S., Shimeall T.J., Safety Verification of ADA Programs Using Software Fault Trees, IEEE software, 8(7):48-59, July [5] Papadopoulos Y., McDermid J.A., A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems, ICSSEA 99, 4(13):1-9, Paris, [6] Papadopoulos Y., McDermid J.A., Hierarchically Performed Hazard Origin and Propagation Studies, Lecture Notes in Computer Science, 1698: , Springer-Verlag, [7] Csert n, A. Pataricza, and E. Sel nyi, Dependability analysis in HW-SW Co-design, IEEE Computer Performance and Dependability Symposium, IPDS'95, pages , [8] Scheidler C., Pushner P., Boutin S., Fuchs E., Gruensteidl G., Papadopoulos Y., Pisecky M., Rennhack J., Virnich U., Systems Engineering of Time-Triggered architectures The SETTA Approach, DCCS-2000, Sydney, November 2000.

Component Failure Behaviour: Patterns and Reuse in Automated System Safety Analysis

Component Failure Behaviour: Patterns and Reuse in Automated System Safety Analysis Component Failure Behaviour: Patterns and Reuse in Automated System Safety Analysis Yannis Papadopoulos, Audrey Tran, Jean-Marc Faure, Christian Grante To cite this version: Yannis Papadopoulos, Audrey

More information

A DEVELOPMENT OF HAZARD ANALYSIS TO AID SOFTWARE DESIGN

A DEVELOPMENT OF HAZARD ANALYSIS TO AID SOFTWARE DESIGN A DEVELOPMENT OF HAZARD ANALYSIS TO AID SOFTWARE DESIGN J. A. McDermid and D. J. Pumfrey, Dependable Computing Systems Centre, Department of Computer Science, University of York, Heslington, York YO1 5DD,

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

ISO compliant verification of functional requirements in the model-based software development process

ISO compliant verification of functional requirements in the model-based software development process requirements in the model-based software development process Hans J. Holberg SVP Marketing & Sales, BTC Embedded Systems AG An der Schmiede 4, 26135 Oldenburg, Germany hans.j.holberg@btc-es.de Dr. Udo

More information

An Information Model for High-Integrity Real Time Systems

An Information Model for High-Integrity Real Time Systems An Information Model for High-Integrity Real Time Systems Alek Radjenovic, Richard Paige, Philippa Conmy, Malcolm Wallace, and John McDermid High-Integrity Systems Group, Department of Computer Science,

More information

Introduction to Control Systems Design

Introduction to Control Systems Design Experiment One Introduction to Control Systems Design Control Systems Laboratory Dr. Zaer Abo Hammour Dr. Zaer Abo Hammour Control Systems Laboratory 1.1 Control System Design The design of control systems

More information

Lecture 5 Safety Analysis FHA, HAZOP

Lecture 5 Safety Analysis FHA, HAZOP Lecture 5 Safety Analysis FHA, HAZOP Introduction While designing a safety-critical system usually several safety analysis techniques are applied The idea is to achieve completeness of safety requirements,

More information

EXPERIENCES FROM MODEL BASED DEVELOPMENT OF DRIVE-BY-WIRE CONTROL SYSTEMS

EXPERIENCES FROM MODEL BASED DEVELOPMENT OF DRIVE-BY-WIRE CONTROL SYSTEMS EXPERIENCES FROM MODEL BASED DEVELOPMENT OF DRIVE-BY-WIRE CONTROL SYSTEMS Per Johannessen 1, Fredrik Törner 1 and Jan Torin 2 1 Volvo Car Corporation, Department 94221, ELIN, SE-405 31 Göteborg, SWEDEN;

More information

ISO Compliant Automatic Requirements-Based Testing for TargetLink

ISO Compliant Automatic Requirements-Based Testing for TargetLink ISO 26262 Compliant Automatic Requirements-Based Testing for TargetLink Dr. Udo Brockmeyer CEO BTC Embedded Systems AG An der Schmiede 4, 26135 Oldenburg, Germany udo.brockmeyer@btc-es.de Adrian Valea

More information

Components Based Design and Development. Unit 3: Software Design Quick Overview

Components Based Design and Development. Unit 3: Software Design Quick Overview Components Based Design and Development Computer Engineering Studies Universidad Carlos III de Madrid Unit 3: Software Design Quick Overview Juan Llorens Högskolan på Åland Finland / Universidad Carlos

More information

Software Development Chapter 1

Software Development Chapter 1 Software Development Chapter 1 1. Introduction Software Applications are increasingly used to tackle problems that concern everyday life : Automatic Bank tellers Airline reservation systems Air traffic

More information

A Model-Based Reference Workflow for the Development of Safety-Related Software

A Model-Based Reference Workflow for the Development of Safety-Related Software A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT

More information

INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2

INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 1 Faculty of Sciences, Lebanese University 2 LINA Laboratory, University of Nantes ABSTRACT:

More information

Issues in Programming Language Design for Embedded RT Systems

Issues in Programming Language Design for Embedded RT Systems CSE 237B Fall 2009 Issues in Programming Language Design for Embedded RT Systems Reliability and Fault Tolerance Exceptions and Exception Handling Rajesh Gupta University of California, San Diego ES Characteristics

More information

A Software Safety Argument Pattern Catalogue

A Software Safety Argument Pattern Catalogue A Software Safety Argument Pattern Catalogue R. Hawkins and T. Kelly {richard.hawkins\tim.kelly}@york.ac.uk Department of Computer Science The University of York Abstract This document presents a catalogue

More information

Flight Systems are Cyber-Physical Systems

Flight Systems are Cyber-Physical Systems Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November

More information

Fault-Injection testing and code coverage measurement using Virtual Prototypes on the context of the ISO standard

Fault-Injection testing and code coverage measurement using Virtual Prototypes on the context of the ISO standard Fault-Injection testing and code coverage measurement using Virtual Prototypes on the context of the ISO 26262 standard NMI Automotive Electronics Systems 2013 Event Victor Reyes Technical Marketing System

More information

Massive Data Analysis

Massive Data Analysis Professor, Department of Electrical and Computer Engineering Tennessee Technological University February 25, 2015 Big Data This talk is based on the report [1]. The growth of big data is changing that

More information

MAENAD Analysis Workbench

MAENAD Analysis Workbench Grant Agreement 260057 Model-based Analysis & Engineering of Novel Architectures for Dependable Electric Vehicles Report type Report name Deliverable D5.2.1 MAENAD Analysis Workbench Dissemination level

More information

Subsystem Hazard Analysis (SSHA)

Subsystem Hazard Analysis (SSHA) Subsystem Hazard Analysis (SSHA) c "!$#%! Examine subsystems to determine how their Normal performance Operational degradation Functional failure Unintended function Inadvertent function (proper function

More information

Design and Synthesis for Test

Design and Synthesis for Test TDTS 80 Lecture 6 Design and Synthesis for Test Zebo Peng Embedded Systems Laboratory IDA, Linköping University Testing and its Current Practice To meet user s quality requirements. Testing aims at the

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation

Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Prof. Dr.-Ing. Stefan Kowalewski Chair Informatik 11, Embedded Software Laboratory RWTH Aachen University Summer Semester

More information

Quality and usability: A new framework

Quality and usability: A new framework van Veenendaal, E, and McMullan, J (eds) Achieving software product quality, Tutein Nolthenius, Netherlands, 1997 Quality and usability: A new framework Nigel Bevan Usability Services National Physical

More information

Complexity-Reducing Design Patterns for Cyber-Physical Systems. DARPA META Project. AADL Standards Meeting January 2011 Steven P.

Complexity-Reducing Design Patterns for Cyber-Physical Systems. DARPA META Project. AADL Standards Meeting January 2011 Steven P. Complexity-Reducing Design Patterns for Cyber-Physical Systems DARPA META Project AADL Standards Meeting 24-27 January 2011 Steven P. Miller Delivered to the Government in Accordance with Contract FA8650-10-C-7081

More information

What are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software

What are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software What are Embedded Systems? 1 Lecture 1 Introduction to Embedded Systems & Software Roopa Rangaswami October 9, 2002 Embedded systems are computer systems that monitor, respond to, or control an external

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

Contemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements.

Contemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements. Contemporary Design We have been talking about design process Let s now take next steps into examining in some detail Increasing complexities of contemporary systems Demand the use of increasingly powerful

More information

Gradational conception in Cleanroom Software Development

Gradational conception in Cleanroom Software Development Gradational conception in Cleanroom Software Development Anshu Sharma 1 and Shilpa Sharma 2 1 DAV Institute of Engineering and Technology, Kabir Nagar, Jalandhar, India 2 Lovely Professional University,

More information

Introduction to Formal Methods

Introduction to Formal Methods 2008 Spring Software Special Development 1 Introduction to Formal Methods Part I : Formal Specification i JUNBEOM YOO jbyoo@knokuk.ac.kr Reference AS Specifier s Introduction to Formal lmethods Jeannette

More information

Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process

Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process Guidelines for deployment of MathWorks R2010a toolset within a DO-178B-compliant process UK MathWorks Aerospace & Defence Industry Working Group Guidelines for deployment of MathWorks R2010a toolset within

More information

Software Architecture. Lecture 4

Software Architecture. Lecture 4 Software Architecture Lecture 4 Last time We discussed tactics to achieve architecture qualities We briefly surveyed architectural styles 23-Jan-08 http://www.users.abo.fi/lpetre/sa08/ 2 Today We check

More information

THE UNIVERSITY OF HULL. in the University of Hull. Ian Philip Wolforth BSc(Hons) MSc. May 2010

THE UNIVERSITY OF HULL. in the University of Hull. Ian Philip Wolforth BSc(Hons) MSc. May 2010 THE UNIVERSITY OF HULL Specification and use of component failure patterns being a Thesis submitted for the Degree of Doctor of Philosophy in the University of Hull by Ian Philip Wolforth BSc(Hons) MSc

More information

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in

More information

Impact of Platform Abstractions on the Development Workflow

Impact of Platform Abstractions on the Development Workflow Impact of Platform Abstractions on the Development Workflow Johannes Pletzer, Wolfgang Pree Technical Report September 7, 2009 C. Doppler Laboratory Embedded Software Systems University of Salzburg Austria

More information

Test requirements in networked systems

Test requirements in networked systems Test requirements in networked systems Jürgen Klüser, Vector Informatik GmbH The use of CAN with J1939 or CANopen based higher layers leads to cost efficient and flexible solutions, but together with a

More information

Workpackage WP2.5 Platform System Architecture. Frank Badstübner Ralf Ködel Wilhelm Maurer Martin Kunert F. Giesemann, G. Paya Vaya, H.

Workpackage WP2.5 Platform System Architecture. Frank Badstübner Ralf Ködel Wilhelm Maurer Martin Kunert F. Giesemann, G. Paya Vaya, H. Guidelines for application Deliverable n. D25.6 Guidelines for application Sub Project SP2 ADAS development platform Workpackage WP2.5 Platform System Architecture Tasks T2.5.4 Guidelines for applications

More information

Report type D2.1 Appendix A3.2 Review of relevant Safety Analysis Techniques

Report type D2.1 Appendix A3.2 Review of relevant Safety Analysis Techniques Grant Agreement 224442 Advancing Traffic Efficiency and Safety through Software Technology phase 2 (ATESST2) Report type D2.1 Appendix A3.2 Report name Review of relevant Safety Analysis Techniques Dissemination

More information

Semantics-Based Integration of Embedded Systems Models

Semantics-Based Integration of Embedded Systems Models Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current

More information

Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar

Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar Current status MC model gradually gaining in sophistication Current status MC model gradually gaining in sophistication Issue Safety-related

More information

Cyber Security of ETCS

Cyber Security of ETCS 1 Addressing the challenges Cyber Security of ETCS Simon Tonks 2 Background The UK rail network is currently being upgraded to use new signalling technology (ERTMS) The ROSCOs are delivering the First

More information

Requirement Analysis

Requirement Analysis Requirement Analysis Requirements Analysis & Specification Objective: determine what the system must do to solve the problem (without describing how) Done by Analyst (also called Requirements Analyst)

More information

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani

International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.7, No.3, May Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani LINK MINING PROCESS Dr.Zakea Il-Agure and Mr.Hicham Noureddine Itani Higher Colleges of Technology, United Arab Emirates ABSTRACT Many data mining and knowledge discovery methodologies and process models

More information

Approaches to Certification of Reconfigurable IMA Systems Paul Hollow, John McDermid, Mark Nicholson, University of York, UK Abstract

Approaches to Certification of Reconfigurable IMA Systems Paul Hollow, John McDermid, Mark Nicholson, University of York, UK Abstract Approaches to Certification of Reconfigurable IMA Systems Paul Hollow, John McDermid, Mark Nicholson, University of York, UK Abstract The aerospace industry have been investigating integrated modular avionics

More information

An Architecture for Semantic Enterprise Application Integration Standards

An Architecture for Semantic Enterprise Application Integration Standards An Architecture for Semantic Enterprise Application Integration Standards Nenad Anicic 1, 2, Nenad Ivezic 1, Albert Jones 1 1 National Institute of Standards and Technology, 100 Bureau Drive Gaithersburg,

More information

Model Based Systems Engineering at DARP. Alek Radjenovic (Malcolm Wallace, Philippa Conmy, John McDermid, Richard Paige)

Model Based Systems Engineering at DARP. Alek Radjenovic (Malcolm Wallace, Philippa Conmy, John McDermid, Richard Paige) Model Based Systems Engineering at DARP Alek Radjenovic (Malcolm Wallace, Philippa Conmy, John McDermid, Richard Paige) Outline Background to HIRTS DARP Architectural Descriptions and Modelling Contracts

More information

Software Engineering (CSC 4350/6350) Rao Casturi

Software Engineering (CSC 4350/6350) Rao Casturi Software Engineering (CSC 4350/6350) Rao Casturi Testing Software Engineering -CSC4350/6350 - Rao Casturi 2 Testing What is testing? Process of finding the divergence between the expected behavior of the

More information

Methods for requirements engineering

Methods for requirements engineering Methods for requirements engineering Objectives To explain the role of methods and techniques in requirements engineering To introduce data-flow modelling To introduce semantic data modelling To introduce

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

1993 Paper 3 Question 6

1993 Paper 3 Question 6 993 Paper 3 Question 6 Describe the functionality you would expect to find in the file system directory service of a multi-user operating system. [0 marks] Describe two ways in which multiple names for

More information

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0 Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version

More information

FORMALIZED SOFTWARE DEVELOPMENT IN AN INDUSTRIAL ENVIRONMENT

FORMALIZED SOFTWARE DEVELOPMENT IN AN INDUSTRIAL ENVIRONMENT FORMALIZED SOFTWARE DEVELOPMENT IN AN INDUSTRIAL ENVIRONMENT Otthein Herzog IBM Germany, Dept. 3100 P.O.Box 80 0880 D-7000 STUTTGART, F. R. G. ABSTRACT tn the IBM Boeblingen Laboratory some software was

More information

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements Capturing and Formalizing SAF Availability Management Framework Configuration Requirements A. Gherbi, P. Salehi, F. Khendek and A. Hamou-Lhadj Electrical and Computer Engineering, Concordia University,

More information

DEVELOPMENT OF DISTRIBUTED AUTOMOTIVE SOFTWARE The DaVinci Methodology

DEVELOPMENT OF DISTRIBUTED AUTOMOTIVE SOFTWARE The DaVinci Methodology DEVELOPMENT OF DISTRIBUTED AUTOMOTIVE SOFTWARE The DaVinci Methodology Dr. Uwe Honekamp, Matthias Wernicke Vector Informatik GmbH, Dep. PND - Tools for Networks and distributed Systems Abstract: The software

More information

Simulink/Stateflow. June 2008

Simulink/Stateflow. June 2008 Simulink/Stateflow Paul Caspi http://www-verimag.imag.fr/ Pieter Mosterman http://www.mathworks.com/ June 2008 1 Introduction Probably, the early designers of Simulink in the late eighties would have been

More information

SySTEMA. SYstem & Safety Tool for Executing Model-based Analyses

SySTEMA. SYstem & Safety Tool for Executing Model-based Analyses SySTEMA SYstem & Safety Tool for Executing Model-based Analyses Alessio Costantini, Fancesco Inglima, Rodolfo Mazzei, Sergio Di Ponzio System Engineering Local Expertise Center ALTRAN ITALY alessio.costantini@altran.com,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

First GENESYS Architectures Implemented in the INDEXYS Project

First GENESYS Architectures Implemented in the INDEXYS Project Project n 100021 First GENESYS Architectures Implemented in the INDEXYS Project An Overview on the Technical Project Contents and Status Quo Andreas Eckel, TTTech Computertechnik AG CROSS FUNDING-PROVIDER

More information

A Systematic Approach for Developing Software Safety Arguments

A Systematic Approach for Developing Software Safety Arguments A Systematic Approach for Developing Software Safety Arguments R.D. Hawkins, Ph.D.; Software Systems Engineering Initiative; The University of York, York, UK T.P. Kelly, PhD; Department of Computer Science;

More information

Adding Formal Requirements Modeling to SysML

Adding Formal Requirements Modeling to SysML Adding Formal Requirements Modeling to SysML Mark R. Blackburn www.markblackburn.com Abstract. This paper seeks to raise awareness on the SCR extensions derived from industry use, and discusses how an

More information

Mathematics and Computing: Level 2 M253 Team working in distributed environments

Mathematics and Computing: Level 2 M253 Team working in distributed environments Mathematics and Computing: Level 2 M253 Team working in distributed environments SR M253 Resource Sheet Specifying requirements 1 Overview Having spent some time identifying the context and scope of our

More information

Introduction to Software Fault Tolerance Techniques and Implementation. Presented By : Hoda Banki

Introduction to Software Fault Tolerance Techniques and Implementation. Presented By : Hoda Banki Introduction to Software Fault Tolerance Techniques and Implementation Presented By : Hoda Banki 1 Contents : Introduction Types of faults Dependability concept classification Error recovery Types of redundancy

More information

Performance Contracts in SDN Systems

Performance Contracts in SDN Systems Performance Contracts in SDN Systems May 2017 Published in IEEE Softwarization - May 2017 Abstract SDN virtualizes connectivity and access to the underlying bearers. This enables more variety of routes

More information

Web Services Annotation and Reasoning

Web Services Annotation and Reasoning Web Services Annotation and Reasoning, W3C Workshop on Frameworks for Semantics in Web Services Web Services Annotation and Reasoning Peter Graubmann, Evelyn Pfeuffer, Mikhail Roshchin Siemens AG, Corporate

More information

Software architecture in ASPICE and Even-André Karlsson

Software architecture in ASPICE and Even-André Karlsson Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12

More information

Eliminating Annotations by Automatic Flow Analysis of Real-Time Programs

Eliminating Annotations by Automatic Flow Analysis of Real-Time Programs Eliminating Annotations by Automatic Flow Analysis of Real-Time Programs Jan Gustafsson Department of Computer Engineering, Mälardalen University Box 883, S-721 23 Västerås, Sweden jangustafsson@mdhse

More information

Probabilistic Failure Propagation and Transformation Analysis

Probabilistic Failure Propagation and Transformation Analysis Probabilistic Failure Propagation and Transformation Analysis Xiaocheng Ge, Richard F. Paige, and John A. McDermid Department of Computer Science, University of York, UK {xchge,paige,jam}@cs.york.ac.uk

More information

Timestamps and authentication protocols

Timestamps and authentication protocols Timestamps and authentication protocols Chris J. Mitchell Technical Report RHUL MA 2005 3 25 February 2005 Royal Holloway University of London Department of Mathematics Royal Holloway, University of London

More information

This is a repository copy of A Rule Chaining Architecture Using a Correlation Matrix Memory.

This is a repository copy of A Rule Chaining Architecture Using a Correlation Matrix Memory. This is a repository copy of A Rule Chaining Architecture Using a Correlation Matrix Memory. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/88231/ Version: Submitted Version

More information

Model-based System Engineering for Fault Tree Generation and Analysis

Model-based System Engineering for Fault Tree Generation and Analysis Model-based System Engineering for Fault Tree Generation and Analysis Nataliya Yakymets, Hadi Jaber, Agnes Lanusse CEA Saclay Nano-INNOV, Institut CARNOT CEA LIST, DILS, 91 191 Gif sur Yvette CEDEX, Saclay,

More information

Architectural Blueprint

Architectural Blueprint IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint

More information

Functional Safety and Safety Standards: Challenges and Comparison of Solutions AA309

Functional Safety and Safety Standards: Challenges and Comparison of Solutions AA309 June 25th, 2007 Functional Safety and Safety Standards: Challenges and Comparison of Solutions AA309 Christopher Temple Automotive Systems Technology Manager Overview Functional Safety Basics Functional

More information

RPC Interface Specification November 2001 Introduction

RPC Interface Specification November 2001 Introduction Issue 2 Gordon Hopkins [M328] RPC Interface Specification November 2001 Introduction In order to provide reliable communications between a PC of any kind and a Model Railway layout, a strict communication

More information

Software Quality. Chapter What is Quality?

Software Quality. Chapter What is Quality? Chapter 1 Software Quality 1.1 What is Quality? The purpose of software quality analysis, or software quality engineering, is to produce acceptable products at acceptable cost, where cost includes calendar

More information

The Automatic Design of Batch Processing Systems

The Automatic Design of Batch Processing Systems The Automatic Design of Batch Processing Systems by Barry Dwyer, M.A., D.A.E., Grad.Dip. A thesis submitted for the degree of Doctor of Philosophy in the Department of Computer Science University of Adelaide

More information

Programming Languages Third Edition. Chapter 7 Basic Semantics

Programming Languages Third Edition. Chapter 7 Basic Semantics Programming Languages Third Edition Chapter 7 Basic Semantics Objectives Understand attributes, binding, and semantic functions Understand declarations, blocks, and scope Learn how to construct a symbol

More information

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 11/10/2015

Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm. Rao Casturi 11/10/2015 Software Engineering Fall 2015 (CSC 4350/6350) TR. 5:30 pm 7:15 pm Rao Casturi 11/10/2015 http://cs.gsu.edu/~ncasturi1 Class announcements Final Exam date - Dec 1 st. Final Presentations Dec 3 rd. And

More information

Distributed Systems Programming (F21DS1) Formal Verification

Distributed Systems Programming (F21DS1) Formal Verification Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on

More information

PPOOA, An Architectural Style for Real Time Systems

PPOOA, An Architectural Style for Real Time Systems PPOOA, An Architectural Style for Real Time Systems José Luis Fernández Sánchez Industrial Engineering School Universidad Politécnica de Madrid e-mail: fernandezjl@acm.org September 2004 PPOOA-WP-01_2004.pdf

More information

PUBLIC CONSULTATION ON EBA XBRL TAXONOMY V2.1 EBA/CP/2014/ March Consultation Paper

PUBLIC CONSULTATION ON EBA XBRL TAXONOMY V2.1 EBA/CP/2014/ March Consultation Paper EBA/CP/2014/03 21 March 2014 Consultation Paper On XBRL Taxonomy (v2.1) related to remittance of supervisory data under Regulation (EU) No 575/2013 Contents 1. Responding to this Consultation 3 2. Executive

More information

Concurrent Exception Handling and Resolution in Distributed Object Systems

Concurrent Exception Handling and Resolution in Distributed Object Systems Concurrent Exception Handling and Resolution in Distributed Object Systems Presented by Prof. Brian Randell J. Xu A. Romanovsky and B. Randell University of Durham University of Newcastle upon Tyne 1 Outline

More information

Part 2: Basic concepts and terminology

Part 2: Basic concepts and terminology Part 2: Basic concepts and terminology Course: Dependable Computer Systems 2012, Stefan Poledna, All rights reserved part 2, page 1 Def.: Dependability (Verlässlichkeit) is defined as the trustworthiness

More information

Teamcenter Getting Started with Systems Engineering. Publication Number PLM00192 D

Teamcenter Getting Started with Systems Engineering. Publication Number PLM00192 D Teamcenter 10.1 Getting Started with Systems Engineering Publication Number PLM00192 D Proprietary and restricted rights notice This software and related documentation are proprietary to Siemens Product

More information

Testing for the Unexpected Using PXI

Testing for the Unexpected Using PXI Testing for the Unexpected Using PXI An Automated Method of Injecting Faults for Engine Management Development By Shaun Fuller Pickering Interfaces Ltd. What will happen if a fault occurs in an automotive

More information

A CAN-Based Architecture for Highly Reliable Communication Systems

A CAN-Based Architecture for Highly Reliable Communication Systems A CAN-Based Architecture for Highly Reliable Communication Systems H. Hilmer Prof. Dr.-Ing. H.-D. Kochs Gerhard-Mercator-Universität Duisburg, Germany E. Dittmar ABB Network Control and Protection, Ladenburg,

More information

Automated Freedom from Interference Analysis for Automotive Software

Automated Freedom from Interference Analysis for Automotive Software Automated Freedom from Interference Analysis for Automotive Software Florian Leitner-Fischer ZF TRW 78315 Radolfzell, Germany Email: florian.leitner-fischer@zf.com Stefan Leue Chair for Software and Systems

More information

Software Engineering Fall 2014

Software Engineering Fall 2014 Software Engineering Fall 2014 (CSC 4350/6350) Mon.- Wed. 5:30 pm 7:15 pm ALC : 107 Rao Casturi 11/10/2014 Final Exam date - Dec 10 th? Class announcements Final Presentations Dec 3 rd. And Dec 8 th. Ability

More information

A Tutorial on Agent Based Software Engineering

A Tutorial on Agent Based Software Engineering A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on Agent Based Software Engineering Qun Zhou December, 2002 Abstract Agent oriented software

More information

Guido Sandmann MathWorks GmbH. Michael Seibt Mentor Graphics GmbH ABSTRACT INTRODUCTION - WORKFLOW OVERVIEW

Guido Sandmann MathWorks GmbH. Michael Seibt Mentor Graphics GmbH ABSTRACT INTRODUCTION - WORKFLOW OVERVIEW 2012-01-0962 AUTOSAR-Compliant Development Workflows: From Architecture to Implementation Tool Interoperability for Round-Trip Engineering and Verification & Validation Copyright 2012 The MathWorks, Inc.

More information

Automated Improvement for Component Reuse

Automated Improvement for Component Reuse Automated Improvement for Component Reuse Muthu Ramachandran School of Computing The Headingley Campus Leeds Metropolitan University LEEDS, UK m.ramachandran@leedsmet.ac.uk Abstract Software component

More information

Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study

Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study Jane Fenn and Richard Hawkins BAE SYSTEMS, Brough, UK Phil Williams General Dynamics (United Kingdom)

More information

A Rule Chaining Architecture Using a Correlation Matrix Memory. James Austin, Stephen Hobson, Nathan Burles, and Simon O Keefe

A Rule Chaining Architecture Using a Correlation Matrix Memory. James Austin, Stephen Hobson, Nathan Burles, and Simon O Keefe A Rule Chaining Architecture Using a Correlation Matrix Memory James Austin, Stephen Hobson, Nathan Burles, and Simon O Keefe Advanced Computer Architectures Group, Department of Computer Science, University

More information

UK EPR GDA PROJECT. Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011. Resolution Plan Revision History

UK EPR GDA PROJECT. Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011. Resolution Plan Revision History RP unique number: GI-UKEPR-CI-01-RP 0 30/06/2011 1 of 19 Approved for EDF by: A. PETIT Approved for AREVA by: C. WOOLDRIDGE Name/Initials Date 30/06/2011 Name/Initials Date 30/06/2011 Resolution Plan History

More information

Briefing Paper: developing the DOI Namespace

Briefing Paper: developing the DOI Namespace 010123-DOI-NS-paper.doc 1 Briefing Paper: developing the DOI Namespace This briefing paper describes a project that has been commissioned by the IDF for completion during the first half of 2001. The paper

More information

A Modelling and Analysis Environment for LARES

A Modelling and Analysis Environment for LARES A Modelling and Analysis Environment for LARES Alexander Gouberman, Martin Riedl, Johann Schuster, and Markus Siegle Institut für Technische Informatik, Universität der Bundeswehr München, {firstname.lastname@unibw.de

More information

Transformation of analysis model to design model

Transformation of analysis model to design model 2010 International Conference on E-business, Management and Economics IPEDR vol.3 (2011) (2011) IACSIT Press, Hong Kong Transformation of analysis model to design model Lalji Prasad Truba College of Engineering

More information

PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS

PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS Federal Aviation Administration 6th IAASS Conference Session 10: Launch Safety Part 1 By:, Elisabeth Morse (Valador Inc.), Paul Rosati

More information

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based

More information

Ingegneria del Software II academic year: Course Web-site: [www.di.univaq.it/ingegneria2/]

Ingegneria del Software II academic year: Course Web-site: [www.di.univaq.it/ingegneria2/] Course: Ingegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/] Verification and Validation Lecturer: Henry Muccini and Vittorio Cortellessa Computer Science

More information

IDEF* - A comprehensive Modelling Methodology for the Development of Manufacturing Enterprise Systems

IDEF* - A comprehensive Modelling Methodology for the Development of Manufacturing Enterprise Systems SIMTech Technical Report () IDEF* - A comprehensive Modelling Methodology for the Development of Manufacturing Dr Ang Cheng Leong (Operations & Supply Chain Applications Group, Manufacturing Information

More information