“Exploitation of Non-intrusive Monitoring in Real-Time Embedded Systems”
From Navigators
(Difference between revisions)
m |
|||
(2 intermediate revisions not shown) | |||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
- | |type= | + | |type=inproceedings |
|document=Pinto2014INForum.pdf | |document=Pinto2014INForum.pdf | ||
|title=Exploitation of Non-intrusive Monitoring in Real-Time Embedded Systems | |title=Exploitation of Non-intrusive Monitoring in Real-Time Embedded Systems | ||
Line 20: | Line 20: | ||
mentation. | mentation. | ||
|address=Porto, Portugal | |address=Porto, Portugal | ||
- | |booktitle=Communication at the Embedded and Real-Time Systems Session of | + | |booktitle=Communication at the Embedded and Real-Time Systems Session of the 6th Simpósio de Informática (INForum) |
- | + | ||
|pages=1-1 | |pages=1-1 | ||
}} | }} |
Latest revision as of 02:26, 23 July 2015
Ricardo Correia Pinto, José Rufino
in Communication at the Embedded and Real-Time Systems Session of the 6th Simpósio de Informática (INForum), Porto, Portugal, Sept. 2014, pp. 1–1.
Abstract: Software execution monitoring in embedded systems can be performed with different purposes, ranging from system characterization to run-time verification (RV). Traditional RV techniques require the intrumentation of the code for monitoring, which brings an overhead to the execution of the system - both in performance and timeliness. In real- time systems this overhead is exarcebated by the need of new worst-case execution time estimation and schedulability analysis. In this paper we show how non-intrusive monitoring mechanisms can be exploited to support Run-time Verification (RV) in real-time embedded systems, thus allowing run-time verification without the need for code instrumentation and therefore negating the penalties incurred by instru- mentation.
Download paper
Download Exploitation of Non-intrusive Monitoring in Real-Time Embedded Systems
Export citation
Project(s): Project:READAPT, Project:KARYON
Research line(s): Timeliness and Adaptation in Dependable Systems (TADS)