On Recovering from Run-time Misbehaviour in ADR
نویسندگان
چکیده
منابع مشابه
On Recovering from Run-time Misbehaviour in ADR
We propose a monitoring mechanism for recording the evolution of systems after certain computations, maintaining the history in a tree-like structure. Technically, we develop the monitoring mechanism in a variant of ADR (after Architectural Design Rewriting), a rule-based formal framework for modelling the evolution of architectures of systems. The hierarchical nature of ADR allows us to take f...
متن کاملA design-by-contract approach to recover the architectural style from run-time misbehaviour
We propose to control the reconfigurations of applications leading to an erro-neous state by exploiting its architectural model. Our work relies on Architec-tural Design Rewriting (ADR, for short) which is a rule-based formal frameworkfor modelling (the evolution of) software architectures. We equip the reconfig-uration rules of an ADR architecture with preand post-conditions ex...
متن کاملRun Time Compile Time Compile − time Specialization Run − time
Because of its wide applicability, many eecient implementations of the Fast Fourier Transform have been developed. We propose that an eecient implementation can be produced automatically and reliably by partial evaluation. Partial evaluation of an unoptimized implementation produces a speedup of over 9 times. The automatically generated result of partial evaluation has performance comparable to...
متن کاملOn Guard: Producing Run-Time Checks from Integrity Constraints
Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code executed before a data update is performed. The guard returns “true” just if the update will preserve data integrity. The problem considered here is how integrity guards can be produced automatically from data integrity constraints. W...
متن کاملProtecting Infrastructure Assets from Real-Time and Run-Time Threats
Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science
سال: 2013
ISSN: 2075-2180
DOI: 10.4204/eptcs.131.7