skip to main content
10.1145/2038642.2038647acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

Resource allocation contracts for open analytic runtime models

Published: 09 October 2011 Publication History

Abstract

Open Analytic Runtime (OAR) Models embed analysis algorithms into runtime architectural models, thus integrating the model and its analytic interpretations. Such an integration is critical for Cyber-Physical Systems (CPS) when model parts are independently developed by different teams as it is the case in multi-tier industries, e.g. avionics and automotive. Analysis algorithms play a central role augmenting the designer's capacity to automatically verify properties of interest in systems at the scale and complexity required by these industries. Unfortunately, the verification results are valid only if the assumptions of the different analysis algorithms (analytic assumptions) are consistent with each other. This paper presents our work on the automatic verification of one important class of analytic assumptions in OAR models: resource allocation assumptions. These assumptions are modeled as Resource Allocation (RA) contracts. RA contract constructs include not only the typical assumes and guarantees but also runtime facts and implications. Finally, we automatically determine the correct sequence of execution of the analysis algorithms based on the contract input/output dependencies described in our models. Together these characteristics enable the automatic assumption verification that preserves the scalability of analytic models. We illustrate our approach using an example model with analysis algorithms for security, schedulability, and energy efficiency.

References

[1]
gPROMS. http://www.psenterprise.com/gproms/.
[2]
Peter J. Ashenden, Gregory D. Peterson, and Darrell A. Teegarden. The System Designer's Guide to VHDL-AMS: Analog, Mixed-Signal, and Mixed-Technology Modeling. Morgan Kaufmann, 2002.
[3]
Mike Barnett, K. Rustan M. Leino, and Wolfram Schulte. The Spec# Programming System: An Overview. pages 49--69. Springer, 2004.
[4]
Albert Benveniste, Benoit Caillaud, and Roberto Passerone. A Generic Model of Contracts for Embedded Systems. Research Report RR-6214, INRIA, 2007.
[5]
A. Benveniste, B. Caillaud, and R. Passerone. A generic model of contracts for embedded systems. CoRR, abs/0706.1456, 2007.
[6]
Yoonsik Cheon, Gary Leavens, Murali Sitaraman, and Stephen Edwards. Model variables: cleanly supporting abstraction in design by contract: Research Articles. Softw. Pract. Exper., 35(6):583--599, 2005.
[7]
S. Colin and L. Mariani. Run-Time Verification. In Manfred Broy, Bengt Jonsson, Joost-Pieter Katoen, Martin Leucker, and Alexander Pretschner, editors, Model-Based Testing of Reactive Systems, volume 3472 of Lecture Notes in Computer Science, pages 525--555. Springer.
[8]
Dionisio de Niz and Raj Rajkumar. Partitioning Bin-Packing Algorithms for Distributed Real-Time Systems. International Journal of Embedded Systems, 2(3/4):196--208, 2006.
[9]
Birgit Demuth and Claas Wilke. Model and Object Verification by Using Dresden OCL. In Proceedings of the Russian-German Workshop Innovation Information Technologies: theory and practice, pages 687--690, Ufa, Russia, 2009.
[10]
M. Faugere, T. Bourbeau, R. De Simone, and S. Gerard. MARTE: Also an UML Profile for Modeling AADL Applications. In Proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems, pages 359--364, July 2007.
[11]
Cormac Flanagan, K. Rustan M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, and Raymie Stata. Extended static checking for Java. In PLDI '02: Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation, pages 234--245, New York, NY, USA, 2002. ACM.
[12]
Martin Fowler and Kendall Scott. UML Distilled: A Brief Guide to the Standard Object Modeling Language. Addison-Wesley, 1999.
[13]
P. Fritzson and P. Bunus. Modelica - a general object-oriented language for continuous and discrete-event system modeling and simulation. In Simulation Symposium, 2002. Proceedings. 35th Annual, pages 365--380, 14--18 2002.
[14]
Jorgen Hansson, Lutz Wrage, Peter H. Feiler, John Morley, Bruce Lewis, and Jerome Hugues. Architectural Modeling to Verify Security and Nonfunctional Behavior. IEEE Security and Privacy, 8:43--49, 2010.
[15]
E. Huang, R. Ramamurthy, and L.F. McGinnis. System and simulation modeling using SYSML. In Simulation Conference, 2007 Winter, pages 796 --803, 9--12 2007.
[16]
Daniel Jackson. Alloy: A lightweight object modelling notation. ACM Transactions on Software Engineering and Methodology, 2002.
[17]
Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, and William Griswold. Getting started with ASPECTJ. Commun. ACM, 44:59--65, October 2001.
[18]
Yamuna Krishnamurthy, Irfan Pyarali, Christopher Gill, Louis Mgeta, Yuanfang Zhang, Stephen Torri, and Douglas C. Schmidt. The Design and Implementation of Real-Time CORBA 2.0: Dynamic Scheduling in TAO. In In Proceedings of RealTime and Embedded Technology and Applications Symposium, 2004.
[19]
Gary Leavens, K. Leino, and Peter Müller. Specification and verification challenges for sequential object-oriented programs. Formal Aspects of Computing, 19:159--189, 2007.
[20]
Gary T. Leavens, Yoonsik Cheon, Curtis Clifton, Clyde Ruby, and David R. Cok. How the design of JML accommodates both runtime assertion checking and formal verification. Sci. Comput. Program., 55(1-3):185--208, 2005.
[21]
C. L. Liu and James W. Layland. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM, 20:46--61, January 1973.
[22]
Bertrand Meyer. Object-oriented Software Construction, 1997.
[23]
Audrey Occello, Anne-Marie Dery-Pinna, and Michel Riveill. Validation and Verification of an UML/OCL Model with USE and B: Case Study and Lessons Learnt. In ICSTW '08: Proceedings of the 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, pages 113--120, Washington, DC, USA, 2008. IEEE Computer Society.
[24]
Saowanee Saewong and Ragunathan (Raj) Rajkumar. Practical voltage-scaling for fixed-priority rt-systems. In RTAS '03: Proceedings of the The 9th IEEE Real-Time and Embedded Technology and Applications Symposium, page 106, Washington, DC, USA, 2003. IEEE Computer Society.
[25]
Douglas C. Schmidt and Fred Kuhns. An Overview of the Real-Time CORBA Specification. Computer, 33:56--63, June 2000.
[26]
J. A. Stankovic, Ruiqing Zhu, R. Poornalingam, Chenyang Lu, Zhendong Yu, M. Humphrey, and B. Ellis. VEST: an aspect-based composition tool for real-time systems. In Real-Time and Embedded Technology and Applications Symposium, 2003. Proceedings. The 9th IEEE, pages 58--69, May 2003.

Cited By

View all
  • (2016)Systematic literature review of the objectives, techniques, kinds, and architectures of models at runtimeSoftware and Systems Modeling (SoSyM)10.1007/s10270-013-0394-915:1(31-69)Online publication date: 1-Feb-2016
  • (2015)Eliminating Inter-Domain Vulnerabilities in Cyber-Physical SystemsProceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy10.1145/2808705.2808714(11-22)Online publication date: 16-Oct-2015
  • (2014)Contract-based integration of cyber-physical analysesProceedings of the 14th International Conference on Embedded Software10.1145/2656045.2656052(1-10)Online publication date: 12-Oct-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
EMSOFT '11: Proceedings of the ninth ACM international conference on Embedded software
October 2011
366 pages
ISBN:9781450307147
DOI:10.1145/2038642
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. aadl
  2. assumption management
  3. cyber-physical systems
  4. design by contract
  5. resource allocation

Qualifiers

  • Research-article

Conference

ESWeek '11
ESWeek '11: Seventh Embedded Systems Week
October 9 - 14, 2011
Taipei, Taiwan

Acceptance Rates

Overall Acceptance Rate 60 of 203 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Systematic literature review of the objectives, techniques, kinds, and architectures of models at runtimeSoftware and Systems Modeling (SoSyM)10.1007/s10270-013-0394-915:1(31-69)Online publication date: 1-Feb-2016
  • (2015)Eliminating Inter-Domain Vulnerabilities in Cyber-Physical SystemsProceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy10.1145/2808705.2808714(11-22)Online publication date: 16-Oct-2015
  • (2014)Contract-based integration of cyber-physical analysesProceedings of the 14th International Conference on Embedded Software10.1145/2656045.2656052(1-10)Online publication date: 12-Oct-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media