Modeling and Verification of Redundancy Policies

نویسندگان

  • Hamza Chouh
  • Charlotte Callon
  • Ghita Jalal
  • Frédéric Boulanger
  • Safouan Taha
چکیده

In this paper, we present a metamodel for specifying redundable software and hardware architectures. This metamodel takes into account the constraints on the number of redundant elements, the number of allowed failures, the execution times and allocation constraints. From such a specification, we generate all possible structural configurations. Then, we check that each of these configurations can be scheduled. This has been implemented as a tool chain relying on Alloy, SynDEx, and model transformations in Eclipse/EMF. This work allows system architects to explore different hardware and software architectures to implement different redundancy policies. It has been applied on a simple case study from the Ariane V launcher.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Cold standby redundancy optimization for nonrepairable series-parallel systems: Erlang time to failure distribution

In modeling a cold standby redundancy allocation problem (RAP) with imperfect switching mechanism, deriving a closed form version of a system reliability is too difficult. A convenient lower bound on system reliability is proposed and this approximation is widely used as a part of objective function for a system reliability maximization problem in the literature. Considering this lower bound do...

متن کامل

Integration and Verification of Privacy Policies Using DSML’s Structural Semantics in a SOA-Based Workflow Environment

In order to verify that a lot of legal requirements and regulations are correctly translated into software, this paper provides a solution for formal and computable representations of rules and requirements in data protection legislations with a DSML (Domain Specific Modeling Language). All policies are formally specified through Prolog and then integrated with DSML, According to the time of po...

متن کامل

Formal Verification of a Sensor Voting and Monitoring UML Model⋆

We report on the formal verification of a triple redundancy sensor voting and monitoring model written in UML using the UML Verification Environment (UVE). The original model as provided by Israel Aircraft Industries, Ltd. (IAI) doesn’t adhere to the UVE modelling guidelines and is large in terms of the number of objects and the amount of concurrency compared to the capabilities of the UVE prot...

متن کامل

Modeling of Riyadh Sewage Treatment Plant: 1-Model Development, Verification and Simulation

In Saudi Arabia, the Riyadh Sewage Treatment Plant (RSTP) uses the activated sludge technology as the secondary treatment process for sewage. Due to the complex nature of the process, a rather simplified, yet practical, steady state model that captures the most important features of the RSTP was developed. Actual operating and design conditions were obtained from RSTP data bank. The monthly ave...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013