Concepts and experiments in computational reflection
OOPSLA '87 Conference proceedings on Object-oriented programming systems, languages and applications
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
IEEE Transactions on Computers
Wrapping Real-Time Systems from Temporal Logic Specifications
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Lightweight Reflection for Middleware-based Database Replication
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
Robustness of modular multi-layered software in the automotive domain: a wrapping-based approach
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Towards runtime adaptation in AUTOSAR
ACM SIGBED Review - Special Issue on the 5th Workshop on Adaptive and Reconfigurable Embedded Systems
Hi-index | 0.01 |
In this paper, we present our experience and lessons learnt in applying a multi-level reflective approach to the design and implementation of an industrial embedded dependable system. We reflect in particular on the process by which ideal academic results and assumptions may be mapped to a concrete industrial context. More precisely, our reflection is based on our experience in building an adaptive defense software for a multilayer embedded platform in the automotive industry. This defense software provides a safety bag and is based on computational reflection, an advanced architectural mechanism to separate cross-cutting concerns. Our implementation uses the AUTOSAR middleware, the automotive standard for modular embedded software, and relies on software sensors to observe the behavior of the system, executable assertions to check on-line properties, and software actuators to perform recovery actions. This leads to defense software that is uncoupled from the real functional system and can be adjusted and specialized according to the needs of the system integrator.