The mathematics of Petri nets
Safeware: system safety and computers
Safeware: system safety and computers
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Towards integrated safety analysis and design
ACM SIGAPP Applied Computing Review - Special issue on saftey-critical software
A Method of Analysis of Fault Trees with Time Dependencies
SAFECOMP '00 Proceedings of the 19th International Conference on Computer Safety, Reliability and Security
Model-Based Fault Diagnosis in Dynamic Systems Using Identification Techniques
Model-Based Fault Diagnosis in Dynamic Systems Using Identification Techniques
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Timed Behavior Trees for Failure Mode and Effects Analysis of time-critical systems
Journal of Systems and Software
Software Engineering for Self-Adaptive Systems: A Research Roadmap
Software Engineering for Self-Adaptive Systems
Structural Translation from Time Petri Nets to Timed Automata
Electronic Notes in Theoretical Computer Science (ENTCS)
Component-Based hazard analysis: optimal designs, product lines, and online-reconfiguration
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Model-Driven safety evaluation with state-event-based component failure annotations
CBSE'05 Proceedings of the 8th international conference on Component-Based Software Engineering
Compositional temporal fault tree analysis
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Modeling and verifying dynamic communication structures based on graph transformations
Computer Science - Research and Development
Hi-index | 0.00 |
Today, self-healing is increasingly used in embedded real-time systems, that are applied in safety-critical environments, to reduce hazards. These systems implement self-healing by reconfiguration, i.e., the exchange of system components during run-time that aims at stopping or removing failures. This reaction is subject to hard real-time constraints because reacting too late does not yield the intended effects. Consequently, it is necessary to analyze the propagation of failures over time and also take into account how the propagation of failures is changed by the reconfiguration. Current approaches do not analyze the propagation times of failures and the changes of structural reconfiguration on the failure propagation. We enhance our hazard analysis approach by extending our failure propagation models by propagation times and taking the system's real-time reconfiguration behavior into account. This allows to analyze how a reconfiguration with certain duration changes the failure propagation of a real-time system and thus whether it is able to prevent a hazard. We show the feasibility of our approach by an example case study from the RailCab project.