Monitoring of Timing Constraints with Confidence Threshold Requirements
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
SoftContract: an Assertion-Based Software Development Process that Enables Design-by-Contract
Proceedings of the conference on Design, automation and test in Europe - Volume 1
Java-MaC: A Run-Time Assurance Approach for Java Programs
Formal Methods in System Design
IEEE Transactions on Software Engineering
Monitoring of Timing Constraints with Confidence Threshold Requirements
IEEE Transactions on Computers
Verification of the DEVS model implementation using aspect embedded DEVS
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Implementation and performance evaluation of a real-time e-brokerage system
RTSS'10 Proceedings of the 21st IEEE conference on Real-time systems symposium
Foundations for the run-time monitoring of reactive systems: fundamentals of the MaC language
ICTAC'04 Proceedings of the First international conference on Theoretical Aspects of Computing
SoftContract: model-based design of error-checking code and property monitors
UML'04 Proceedings of the 2004 international conference on UML Modeling Languages and Applications
SoftContract: model-based design of error-checking code and property monitors
UML Modeling Languages and Applications
Hi-index | 0.00 |
As real time applications become more complex and distributed, monitoring for timing constraint compliance becomes more important in facilitating the enforcement of conditional guarantees and for recovery purposes. C.E. Chodrow et al. (1991) described a O(n/sup 3/) satisfiability checking algorithm for timing constraint monitoring at each check point, where n is the number of time terms in the timing constraint specification. We show that a timing violation can be caught as early as possible by deriving and monitoring a minimum set of timing constraints from the timing constraint specification. We show that only O(n) time is needed in the worst case for checking at each check point. An implementation based on the results reported herein appears in a companion paper (A.K. Mok and G. Liu, 1997).