2015
DOI: 10.1109/jproc.2015.2453253
|View full text |Cite
|
Sign up to set email alerts
|

A Platform-Based Design Methodology With Contracts and Related Tools for the Design of Cyber-Physical Systems

Abstract: Abstract-We introduce a platform-based design methodology that uses contracts to specify and abstract the components of a cyber-physical system (CPS), and provide formal support to the entire CPS design flow. The design is carried out as a sequence of refinement steps from a high-level specification to an implementation built out of a library of components at the lower level. We review formalisms and tools that can be used to specify, analyze or synthesize the design at different levels of abstractions. For ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0
3

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 137 publications
(79 citation statements)
references
References 109 publications
0
66
0
3
Order By: Relevance
“…The prevailing thesis is that if we manage to make our requirements formal, we would be able to achieve many things, such as conflict detection and resolution, verifying compliance with regulations, finding incomplete requirements sets, and finding redundant requirements; thus reducing the size of the sets, and synthesizing downstream artifacts for design, verification, and testing. This thesis has been proven rather well in various academic studies (Etzien and Gezgin, 2014;Mignogna et al, 2013;Nuzzo et al, 2015), where the requirements are given in formal languages such as the Object Constraint Language (Object Management Group, 2014) and GCSL (Boyer et al, 2015), and the teams were able to synthesize models, tests (Abel et al 2013), and even whole control algorithms (Liu, 2013). However, such approaches require Ph.D.-level training in formal languages and mathematical formalisms -not a reasonable thing to expect from practicing engineers.…”
Section: Introductionmentioning
confidence: 87%
“…The prevailing thesis is that if we manage to make our requirements formal, we would be able to achieve many things, such as conflict detection and resolution, verifying compliance with regulations, finding incomplete requirements sets, and finding redundant requirements; thus reducing the size of the sets, and synthesizing downstream artifacts for design, verification, and testing. This thesis has been proven rather well in various academic studies (Etzien and Gezgin, 2014;Mignogna et al, 2013;Nuzzo et al, 2015), where the requirements are given in formal languages such as the Object Constraint Language (Object Management Group, 2014) and GCSL (Boyer et al, 2015), and the teams were able to synthesize models, tests (Abel et al 2013), and even whole control algorithms (Liu, 2013). However, such approaches require Ph.D.-level training in formal languages and mathematical formalisms -not a reasonable thing to expect from practicing engineers.…”
Section: Introductionmentioning
confidence: 87%
“…Sztipanovits et al aimed at the challenges of crossdomain heterogeneous interactions among physical and computational/networking domains, and presented a theory of composition to improve stability [51]. Nuzzo P. et al adopt contracts based components specification and abstraction and provided a formal supporting for CPS design [52]. Paul A. et al proposed a general formal framework for architecture composability based on an associative, commutative and idempotent architecture composition operator [53].…”
Section: Dependabilitymentioning
confidence: 99%
“…These tools or languages can be classified into five classes: 1) hardware modeling, 2) architecture modeling/system-level modeling/software modeling, 3) network modeling and simulation, 4) Logical theorem based provers, 5) generic modeling & simulation. Based on the surveys [52,[220][221][222][223] and our knowledge, part of popular tools/languages are exhibited in Table 3. …”
Section: Mde Based Vandv For Dependable Self-managing Cpsmentioning
confidence: 99%
“…The situation is exacerbated by the "trillion devices" scenario posed by the Internet of Things. Devising scalable algorithmic solutions to secure CPS design is, therefore, highly desirable [15].…”
Section: Introductionmentioning
confidence: 99%