首页 > 最新文献

Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering最新文献

英文 中文
Using COTS software in high assurance control applications 在高保证控制应用中使用COTS软件
L. Sha
The vast majority of COTS software components are not developed for high reliability applications. Using them directly in embedded systems with high reliability requirements could be hazardous, as shown in the incidents of Navy ships Yorktown, Vicksburg and USS Hue City.Challenges to Fault Avoidance Approach: Ensuring the reliability of COTS software at the users' site is not an easy task. COTS software components are not subject to customers' high assurance development processes. Customers can buy source code and then subject them to a high-assurance process and make any modifications that are needed. However, this is a high cost solution. Furthermore, once a COTS software component has been modified, it is unlikely compatible with vendors' future releases. As a result, most of the benefits of using COTS are lost. Therefore this approach - making proprietary modifications to COTS components - is inconsistent with the original motivation for their use.Challenges to Fault Tolerance Approach: There are basically two fault tolerance approaches: fault masking and forward recovery. Fault masking tries to prevent incorrect outputs from being used. For example, Recovery Block attempts to check if an output is correct before using it.Unfortunately, it is often difficult to determine the correctness of a computation without knowing what the correct answer is. Forward fault recovery attempts to recover after incorrect outputs are used and it is not suitable for all the applications. Nor is there a general domain independent approach to forward fault recovery.
绝大多数COTS软件组件不是为高可靠性应用程序开发的。直接在具有高可靠性要求的嵌入式系统中使用它们可能是危险的,正如海军船只约克镇,维克斯堡和顺化城号的事件所示。故障避免方法面临的挑战:确保COTS软件在用户站点的可靠性不是一件容易的事情。COTS软件组件不受客户高保证开发过程的约束。客户可以购买源代码,然后将其置于高保证过程中,并进行所需的任何修改。然而,这是一个高成本的解决方案。此外,一旦修改了COTS软件组件,它就不太可能与供应商的未来版本兼容。因此,使用COTS的大部分好处都失去了。因此,这种方法——对COTS组件进行专有修改——与使用它们的原始动机不一致。容错方法面临的挑战:基本上有两种容错方法:故障屏蔽和前向恢复。故障屏蔽试图防止使用不正确的输出。例如,恢复块在使用输出之前尝试检查输出是否正确。不幸的是,如果不知道正确答案是什么,通常很难确定计算的正确性。前向故障恢复尝试在使用错误输出后进行恢复,它并不适用于所有应用程序。也没有一种通用的独立于域的前向故障恢复方法。
{"title":"Using COTS software in high assurance control applications","authors":"L. Sha","doi":"10.1109/HASE.1999.809485","DOIUrl":"https://doi.org/10.1109/HASE.1999.809485","url":null,"abstract":"The vast majority of COTS software components are not developed for high reliability applications. Using them directly in embedded systems with high reliability requirements could be hazardous, as shown in the incidents of Navy ships Yorktown, Vicksburg and USS Hue City.Challenges to Fault Avoidance Approach: Ensuring the reliability of COTS software at the users' site is not an easy task. COTS software components are not subject to customers' high assurance development processes. Customers can buy source code and then subject them to a high-assurance process and make any modifications that are needed. However, this is a high cost solution. Furthermore, once a COTS software component has been modified, it is unlikely compatible with vendors' future releases. As a result, most of the benefits of using COTS are lost. Therefore this approach - making proprietary modifications to COTS components - is inconsistent with the original motivation for their use.Challenges to Fault Tolerance Approach: There are basically two fault tolerance approaches: fault masking and forward recovery. Fault masking tries to prevent incorrect outputs from being used. For example, Recovery Block attempts to check if an output is correct before using it.Unfortunately, it is often difficult to determine the correctness of a computation without knowing what the correct answer is. Forward fault recovery attempts to recover after incorrect outputs are used and it is not suitable for all the applications. Nor is there a general domain independent approach to forward fault recovery.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Look-ahead channel reservation and borrowing in cellular network systems 蜂窝网络系统中的前瞻信道预约与借用
Haihong Zheng, S. Bhattacharya
This paper addresses the channel resource management problem for the cellular wireless network, under various traffic load conditions. Channel borrowing, a critical function in the effective management of cellular networks, is known to offer key performance benefits under hot spot situation. We propose a new channel borrowing approach, termed as LCRB (Look-ahead Channel Reservation and Borrowing)-where the key ideas include the ability to reserve a set of channels for different neighboring cells according to their traffic profile, and to conduct lookahead channel borrowing to provide channel distribution in anticipation of a forthcoming hot spot. The main benefits include the timeliness (i.e., reduced delay) of channel borrowing which can assist to meet deadlines of hard real-time message and to reduce the waiting time of uprising call. Simulation has been conducted to demonstrate the benefits.
本文研究了蜂窝无线网络在各种业务负载条件下的信道资源管理问题。信道借用是蜂窝网络有效管理的关键功能,在热点环境下具有关键的性能优势。我们提出了一种新的通道借用方法,称为LCRB (forward -ahead channel Reservation and borrowing),其关键思想包括根据不同相邻单元的流量配置为其保留一组通道的能力,并进行前瞻性通道借用,以在预期即将到来的热点时提供通道分配。其主要优点包括通道借用的及时性(即减少延迟),可以帮助满足硬实时消息的截止日期,并减少起义呼叫的等待时间。通过仿真验证了该方法的优点。
{"title":"Look-ahead channel reservation and borrowing in cellular network systems","authors":"Haihong Zheng, S. Bhattacharya","doi":"10.1109/HASE.1999.809493","DOIUrl":"https://doi.org/10.1109/HASE.1999.809493","url":null,"abstract":"This paper addresses the channel resource management problem for the cellular wireless network, under various traffic load conditions. Channel borrowing, a critical function in the effective management of cellular networks, is known to offer key performance benefits under hot spot situation. We propose a new channel borrowing approach, termed as LCRB (Look-ahead Channel Reservation and Borrowing)-where the key ideas include the ability to reserve a set of channels for different neighboring cells according to their traffic profile, and to conduct lookahead channel borrowing to provide channel distribution in anticipation of a forthcoming hot spot. The main benefits include the timeliness (i.e., reduced delay) of channel borrowing which can assist to meet deadlines of hard real-time message and to reduce the waiting time of uprising call. Simulation has been conducted to demonstrate the benefits.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"23 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the real-time properties of a U.S. Navy signal processing system 分析美国海军信号处理系统的实时性
S. Goddard, K. Jeffay
The state of the art in verifying the real-time requirements of applications developed using general processing graph models relies on simulation or off-line scheduling. We extend the state of the art by presenting analytical methods that support the analysis of cyclic processing graphs executed with on-line schedulers. We show that it is possible to compute the latency inherent in a processing graph independent of the hardware hosting the application. We also show how to compute the real-time execution rate of each node in the graph. Using the execution rate of each node and the time it takes per execution on a given processor, the resulting CPU utilization can be computed as shown here for the Directed Low Frequency Analysis and Recording (DIFAR) acoustic signal processing application from the Airborne Low Frequency Sonar (ALFS) system of the SH-60B LAMPS MK III anti-submarine helicopter.
验证使用通用处理图模型开发的应用程序的实时需求的最新技术依赖于仿真或离线调度。我们通过提供支持使用在线调度器执行的循环处理图的分析方法来扩展技术的状态。我们展示了独立于承载应用程序的硬件计算处理图中固有的延迟是可能的。我们还展示了如何计算图中每个节点的实时执行率。使用每个节点的执行率和在给定处理器上每次执行所需的时间,可以计算出由此产生的CPU利用率,如图所示,用于SH-60B“灯”MK III反潜直升机机载低频声纳(ALFS)系统的定向低频分析和记录(DIFAR)声学信号处理应用。
{"title":"Analyzing the real-time properties of a U.S. Navy signal processing system","authors":"S. Goddard, K. Jeffay","doi":"10.1109/HASE.1999.809489","DOIUrl":"https://doi.org/10.1109/HASE.1999.809489","url":null,"abstract":"The state of the art in verifying the real-time requirements of applications developed using general processing graph models relies on simulation or off-line scheduling. We extend the state of the art by presenting analytical methods that support the analysis of cyclic processing graphs executed with on-line schedulers. We show that it is possible to compute the latency inherent in a processing graph independent of the hardware hosting the application. We also show how to compute the real-time execution rate of each node in the graph. Using the execution rate of each node and the time it takes per execution on a given processor, the resulting CPU utilization can be computed as shown here for the Directed Low Frequency Analysis and Recording (DIFAR) acoustic signal processing application from the Airborne Low Frequency Sonar (ALFS) system of the SH-60B LAMPS MK III anti-submarine helicopter.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Autonomous data synchronization in heterogeneous systems to assure the transaction 异构系统中的自主数据同步,保证事务的顺利进行
I. Kaji, Yongdong Tan, K. Mori
Many companies have been forced to quickly respond to changing user needs. To provide more convenient services to consumers, the cooperation within a company or across companies have been requested. As a result, the heterogeneous information systems are also requested to be integrated together. By utilizing the heterogeneity among systems and by cooperating between systems, it becomes possible to draw out new values from them without violating each system's characteristic. In the heterogeneous systems, such as the data generation timings or frequencies are different, the data synchronization itself should be done by each system without relying on the single coordinator, because the system configurations are always changing, and members of application group which use synchronous data combination are also changing. In this paper we propose the autonomous data synchronization technique in the heterogeneous systems. The application objects which requires the synchronous combination of the data in each system can locally judge which combination of data is most adequate as the synchronous combination by comparing the synchronous information with others. Thus all systems can use the consistent combination as the synchronous data only by collecting the data locally and exchanging the synchronous information. In addition, the cost of synchronization in each system, which is measured by the synchronization waiting time (SWT) and backward data utilization (BDU) becomes even. As this proposed method is not relying on the single coordinator, it works correctly even if the system configuration is dynamically changed, or even if members of SyncApps are changed. The simulation results show the cost fairness when three systems are interconnected in straight line.
许多公司被迫快速响应不断变化的用户需求。为了给消费者提供更便捷的服务,公司内部或公司之间的合作已经被要求。因此,异构信息系统也被要求集成在一起。通过利用系统之间的异质性和系统之间的合作,可以在不违反每个系统的特性的情况下从中提取新的值。在异构系统中,如数据生成时间或频率不同,则数据同步本身应由各个系统完成,而不依赖于单个协调器,因为系统配置是不断变化的,使用同步数据组合的应用程序组的成员也在不断变化。本文提出了异构系统中的自主数据同步技术。需要各系统数据同步组合的应用对象可以通过与其他同步信息的比较,局部判断哪种数据组合最适合作为同步组合。因此,所有系统只需在本地采集数据并交换同步信息,即可使用一致性组合作为同步数据。此外,每个系统的同步成本(由同步等待时间(SWT)和向后数据利用率(BDU)衡量)变得均匀。由于此建议的方法不依赖于单个协调器,因此即使系统配置动态更改,或者即使SyncApps的成员更改,它也能正常工作。仿真结果表明了三个系统在直线上互连时的成本公平性。
{"title":"Autonomous data synchronization in heterogeneous systems to assure the transaction","authors":"I. Kaji, Yongdong Tan, K. Mori","doi":"10.1109/HASE.1999.809492","DOIUrl":"https://doi.org/10.1109/HASE.1999.809492","url":null,"abstract":"Many companies have been forced to quickly respond to changing user needs. To provide more convenient services to consumers, the cooperation within a company or across companies have been requested. As a result, the heterogeneous information systems are also requested to be integrated together. By utilizing the heterogeneity among systems and by cooperating between systems, it becomes possible to draw out new values from them without violating each system's characteristic. In the heterogeneous systems, such as the data generation timings or frequencies are different, the data synchronization itself should be done by each system without relying on the single coordinator, because the system configurations are always changing, and members of application group which use synchronous data combination are also changing. In this paper we propose the autonomous data synchronization technique in the heterogeneous systems. The application objects which requires the synchronous combination of the data in each system can locally judge which combination of data is most adequate as the synchronous combination by comparing the synchronous information with others. Thus all systems can use the consistent combination as the synchronous data only by collecting the data locally and exchanging the synchronous information. In addition, the cost of synchronization in each system, which is measured by the synchronization waiting time (SWT) and backward data utilization (BDU) becomes even. As this proposed method is not relying on the single coordinator, it works correctly even if the system configuration is dynamically changed, or even if members of SyncApps are changed. The simulation results show the cost fairness when three systems are interconnected in straight line.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115720374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Formally modeling a metal processing plant and its closed loop specifications 对金属加工厂及其闭环规范进行形式化建模
E. Tronci
We present a case study on automatic synthesis of control software from formal specifications for an industrial automation control system. Our aim is to compare the effectiveness (i.e. design effort and controller quality) of automatic controller synthesis from closed loop formal specifications with that of manual controller design followed by automatic verification. The system to be controlled (plant) models a metal processing facility near Karlsruhe. We succeeded in automatically generating C code implementing a (correct by construction) embedded controller for such a plant from closed loop formal specifications. Our experimental results show that for industrial automation control systems automatic synthesis is a viable and profitable (especially as far as design effort is concerned) alternative to manual design followed by automatic verification.
我们提出了一个工业自动化控制系统的控制软件从形式规范自动合成的案例研究。我们的目的是比较从闭环形式规范中自动合成控制器的有效性(即设计工作量和控制器质量)与手动控制器设计然后进行自动验证的有效性。要控制的系统(工厂)以卡尔斯鲁厄附近的金属加工设施为模型。我们成功地从闭环形式规范中自动生成C代码,实现了这样一个工厂的嵌入式控制器(结构正确)。我们的实验结果表明,对于工业自动化控制系统,自动合成是一种可行的和有利可图的(特别是就设计工作而言)替代人工设计然后自动验证。
{"title":"Formally modeling a metal processing plant and its closed loop specifications","authors":"E. Tronci","doi":"10.1109/HASE.1999.809490","DOIUrl":"https://doi.org/10.1109/HASE.1999.809490","url":null,"abstract":"We present a case study on automatic synthesis of control software from formal specifications for an industrial automation control system. Our aim is to compare the effectiveness (i.e. design effort and controller quality) of automatic controller synthesis from closed loop formal specifications with that of manual controller design followed by automatic verification. The system to be controlled (plant) models a metal processing facility near Karlsruhe. We succeeded in automatically generating C code implementing a (correct by construction) embedded controller for such a plant from closed loop formal specifications. Our experimental results show that for industrial automation control systems automatic synthesis is a viable and profitable (especially as far as design effort is concerned) alternative to manual design followed by automatic verification.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security assurance efforts in engineering Java 2 SE (JDK 1.2) 工程中的安全保证工作Java 2 SE (JDK 1.2)
L. Gong, Satya Dodda
With the release of Java 2 SE (Standard Edition, also commonly known as JDK 1.2), Java technology has matured such that it is increasingly deployed as part of the information infrastructure in today's economy and for mission-critical applications. These applications require a high degree of assurance of the underlying technologies, including JDK 1.2. This paper outlines the JDK 1.2 software development process and the special efforts to increase the quality assurance of the security features.
随着Java 2 SE(标准版,通常也称为JDK 1.2)的发布,Java技术已经成熟,越来越多地被部署为当今经济中的信息基础设施的一部分,并用于关键任务应用程序。这些应用程序需要对底层技术(包括JDK 1.2)有高度的保证。本文概述了JDK 1.2软件开发过程以及为增加质量保证所做的特别努力的安全特性。
{"title":"Security assurance efforts in engineering Java 2 SE (JDK 1.2)","authors":"L. Gong, Satya Dodda","doi":"10.1109/HASE.1999.809479","DOIUrl":"https://doi.org/10.1109/HASE.1999.809479","url":null,"abstract":"With the release of Java 2 SE (Standard Edition, also commonly known as JDK 1.2), Java technology has matured such that it is increasingly deployed as part of the information infrastructure in today's economy and for mission-critical applications. These applications require a high degree of assurance of the underlying technologies, including JDK 1.2. This paper outlines the JDK 1.2 software development process and the special efforts to increase the quality assurance of the security features.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Why modern systems should minimize the use of safety critical software* 为什么现代系统应该尽量减少安全关键软件的使用
J. M. Covan
Many high consequence systems today are being controlled, or are under consideration for control, by software. Such systems are called high consequence because their failure could result in large numbers of fatalities or injuries, great environmental despoilment, or complete loss of mission or business purpose.
今天,许多高后果的系统正在被软件控制,或者正在考虑被软件控制。这种系统被称为高后果,因为它们的故障可能导致大量人员伤亡,严重破坏环境,或完全丧失任务或商业目的。
{"title":"Why modern systems should minimize the use of safety critical software*","authors":"J. M. Covan","doi":"10.1109/HASE.1999.809503","DOIUrl":"https://doi.org/10.1109/HASE.1999.809503","url":null,"abstract":"Many high consequence systems today are being controlled, or are under consideration for control, by software. Such systems are called high consequence because their failure could result in large numbers of fatalities or injuries, great environmental despoilment, or complete loss of mission or business purpose.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An "in the limit" view* “in the limit”视图*
L. Dalton
The continuum of systems, based on consequences of failure, range from the completely benign , as in video games, to the extreme, "in the limit" case of nuclear weapons. As a function of consequences, we must apply engineering skill during all phases of system creation to 1) provide for intrinsic surety and 2) allow for systems that yield sufficiently to intellectually based analysis.
系统的连续性,基于失败的后果,范围从完全良性的,如电子游戏,到极端的,“在极限”的情况下,如核武器。作为结果的功能,我们必须在系统创建的所有阶段应用工程技能,以1)提供内在的保证,2)允许系统充分产生基于智力的分析。
{"title":"An \"in the limit\" view*","authors":"L. Dalton","doi":"10.1109/HASE.1999.809504","DOIUrl":"https://doi.org/10.1109/HASE.1999.809504","url":null,"abstract":"The continuum of systems, based on consequences of failure, range from the completely benign , as in video games, to the extreme, \"in the limit\" case of nuclear weapons. As a function of consequences, we must apply engineering skill during all phases of system creation to 1) provide for intrinsic surety and 2) allow for systems that yield sufficiently to intellectually based analysis.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experience of using COTS components for deep space missions 在深空任务中使用COTS组件的经验
S. Chau
In recent years, NASA has adopted a faster, better, and cheaper philosophy for space exploration. This philosophy mandates space missions to be accomplished with much lower cost, shorter development cycle, and more capabilities than ever. In order to meet these challenges, starting 1998, NASA's Office of Space Science has initiated the Advanced Deep Space Systems Technology Program, also known as X2000, to develop advanced technologies for future deep-space exploration missions. One of the focus technology development areas is advanced avionics, which is being developed by the Center for Integrated Space Microsystems (CISM) at the Jet Propulsion Laboratory. Under X2000 and CISM, a breakthrough multi-mission avionics system is being developed. This avionics system employs low cost hardware and software products that are widely available in the commercial market. By using COTS through out the system, we expect to significantly reduce both the development cost as well as the recurring cost of the system, and thus be able to meet the faster, better, cheaper challenges. On the other hand, COTS are not specifically developed for applications such as deep-space missions. Therefore, the real challenges are: How to select COTS technologies How to overcome their shortcomings in space applications.
近年来,美国国家航空航天局采用了一种更快、更好、更便宜的太空探索理念。这一理念要求以比以往更低的成本、更短的开发周期和更多的能力完成太空任务。为了应对这些挑战,从1998年开始,美国宇航局空间科学办公室启动了先进深空系统技术计划,也称为X2000,为未来的深空探测任务开发先进技术。其中一个重点技术开发领域是先进航空电子设备,这是由喷气推进实验室的集成空间微系统中心(CISM)开发的。在X2000和CISM下,一种突破性的多任务航空电子系统正在开发中。这种航空电子系统采用在商业市场上广泛可用的低成本硬件和软件产品。通过在整个系统中使用COTS,我们期望能够显著降低开发成本以及系统的重复成本,从而能够满足更快、更好、更便宜的挑战。另一方面,COTS不是专门为诸如深空任务之类的应用而开发的。因此,真正的挑战在于:如何选择COTS技术,如何克服其在空间应用中的不足。
{"title":"Experience of using COTS components for deep space missions","authors":"S. Chau","doi":"10.1109/HASE.1999.809483","DOIUrl":"https://doi.org/10.1109/HASE.1999.809483","url":null,"abstract":"In recent years, NASA has adopted a faster, better, and cheaper philosophy for space exploration. This philosophy mandates space missions to be accomplished with much lower cost, shorter development cycle, and more capabilities than ever. In order to meet these challenges, starting 1998, NASA's Office of Space Science has initiated the Advanced Deep Space Systems Technology Program, also known as X2000, to develop advanced technologies for future deep-space exploration missions. One of the focus technology development areas is advanced avionics, which is being developed by the Center for Integrated Space Microsystems (CISM) at the Jet Propulsion Laboratory. Under X2000 and CISM, a breakthrough multi-mission avionics system is being developed. This avionics system employs low cost hardware and software products that are widely available in the commercial market. By using COTS through out the system, we expect to significantly reduce both the development cost as well as the recurring cost of the system, and thus be able to meet the faster, better, cheaper challenges. On the other hand, COTS are not specifically developed for applications such as deep-space missions. Therefore, the real challenges are: How to select COTS technologies How to overcome their shortcomings in space applications.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132641145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fault detectability analysis for requirements validation of fault tolerant systems 容错系统需求验证的故障检测分析
Diego Del Gobbo, B. Cukic, M. Napolitano, S. Easterbrook
When high assurance applications are concerned, life cycle process control has witnessed steady improvement over the past two decades. As a consequence, the number of software defects introduced in the later phases of the life cycle, such as detailed design and coding, is decreasing. The majority of the remaining defects originate in the early phases of the life cycle. This is understandable, since the early phases deal with the translation from informal requirements into a formalism that will be used by developers. Since the step from informal to formal notation is inevitable, verification and validation of the requirements continue to be the research focus. Discovering potential problems as early as possible provides the potential for significant reduction in development time and cost. In this paper, the focus is on a specific aspect of requirements validation for dynamic fault tolerant control systems: the feasibility assessment of the fault detection task. An analytical formulation of the fault detectability condition is presented. This formulation is applicable to any system whose dynamics can be approximated by a linear model. The fault detectability condition can be used for objective validation of fault detection requirements. In a case study, we analyze an inverted pendulum system and demonstrate that "reasonable" requirements for a fault detection system can be infeasible when validated against the fault detectability condition.
当涉及到高保证应用时,生命周期过程控制在过去的二十年中得到了稳步的改进。因此,在生命周期的后期阶段(如详细设计和编码)引入的软件缺陷的数量正在减少。大多数剩余的缺陷起源于生命周期的早期阶段。这是可以理解的,因为早期阶段处理从非正式需求到将被开发人员使用的形式化的转换。由于从非正式符号到正式符号的步骤是不可避免的,因此需求的验证和确认仍然是研究的重点。尽早发现潜在的问题可以显著减少开发时间和成本。本文的重点是动态容错控制系统需求验证的一个具体方面:故障检测任务的可行性评估。给出了故障可检测性条件的解析表达式。这个公式适用于任何动力学可以用线性模型近似的系统。故障可检测性条件可用于客观验证故障检测需求。在一个案例研究中,我们分析了一个倒立摆系统,并证明了当针对故障可检测条件进行验证时,对故障检测系统的“合理”要求可能是不可行的。
{"title":"Fault detectability analysis for requirements validation of fault tolerant systems","authors":"Diego Del Gobbo, B. Cukic, M. Napolitano, S. Easterbrook","doi":"10.1109/HASE.1999.809498","DOIUrl":"https://doi.org/10.1109/HASE.1999.809498","url":null,"abstract":"When high assurance applications are concerned, life cycle process control has witnessed steady improvement over the past two decades. As a consequence, the number of software defects introduced in the later phases of the life cycle, such as detailed design and coding, is decreasing. The majority of the remaining defects originate in the early phases of the life cycle. This is understandable, since the early phases deal with the translation from informal requirements into a formalism that will be used by developers. Since the step from informal to formal notation is inevitable, verification and validation of the requirements continue to be the research focus. Discovering potential problems as early as possible provides the potential for significant reduction in development time and cost. In this paper, the focus is on a specific aspect of requirements validation for dynamic fault tolerant control systems: the feasibility assessment of the fault detection task. An analytical formulation of the fault detectability condition is presented. This formulation is applicable to any system whose dynamics can be approximated by a linear model. The fault detectability condition can be used for objective validation of fault detection requirements. In a case study, we analyze an inverted pendulum system and demonstrate that \"reasonable\" requirements for a fault detection system can be infeasible when validated against the fault detectability condition.","PeriodicalId":369187,"journal":{"name":"Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1