On Recovering from Run-time Misbehaviour in ADR

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Recovering from Run-time Misbehaviour in ADR

We propose a monitoring mechanism for recording the evolution of systems after certain computations, maintaining the history in a tree-like structure. Technically, we develop the monitoring mechanism in a variant of ADR (after Architectural Design Rewriting), a rule-based formal framework for modelling the evolution of architectures of systems. The hierarchical nature of ADR allows us to take f...

متن کامل

A design-by-contract approach to recover the architectural style from run-time misbehaviour

We propose to control the reconfigurations of applications leading to an erro-neous state by exploiting its architectural model. Our work relies on Architec-tural Design Rewriting (ADR, for short) which is a rule-based formal frameworkfor modelling (the evolution of) software architectures. We equip the reconfig-uration rules of an ADR architecture with preand post-conditions ex...

متن کامل

Run Time Compile Time Compile − time Specialization Run − time

Because of its wide applicability, many eecient implementations of the Fast Fourier Transform have been developed. We propose that an eecient implementation can be produced automatically and reliably by partial evaluation. Partial evaluation of an unoptimized implementation produces a speedup of over 9 times. The automatically generated result of partial evaluation has performance comparable to...

متن کامل

On Guard: Producing Run-Time Checks from Integrity Constraints

Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code executed before a data update is performed. The guard returns “true” just if the update will preserve data integrity. The problem considered here is how integrity guards can be produced automatically from data integrity constraints. W...

متن کامل

Protecting Infrastructure Assets from Real-Time and Run-Time Threats

Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science

سال: 2013

ISSN: 2075-2180

DOI: 10.4204/eptcs.131.7