2013
DOI: 10.1007/s00607-013-0314-4
|View full text |Cite
|
Sign up to set email alerts
|

An architectural approach to the analysis, verification and validation of software intensive embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…For example, all selected researches have been thoroughly studied and analyzed in order to assign them to corresponding category. Similarly, each selected research is intensively studied and Di et al, 2013, Berrani et al, 2013, Stancescu et al, 2010, Ouchani et al, 2013, Bouquet et al, 2012, DeTommasi et al, 2013, Andrade et al, 2009, Bazydlo et al, 2014, Doligalski and Adamski, 2013, Mueller et al, 2010, Durand and Bonato, 2012, Moreira et al, 2010, Vidal et al, 2009, Linehan and Clarke, 2012, Herrera et al, 2014, Lecomte et al, 2011, Rafiq Quadri et al, 2012, Chen et al, 2013, Vanderperren et al, 2008, Elhaji et al, 2012, Riccobene and Scandurra, 2012Zohaib Iqbal et al, 2013, Chouali and Hammad, 2011, Doering, 2014, Ouchani et al, 2014, Telinski Wiedermann anger et al, 2013, Knorreck and Apvrille, 2011, Ge et al, 2012, Baresi et al, 2013, Huang et al, 2012, Nguyen et al, 2014, Bousse et al, 2012 Modeling 5 Gomez et al, 2012, Penil et al, 2010, Espinoza et al, 2009, Rota Sena Marques et al, 2014, Behjati et al, 2011 Property specification 2 Yin et al, 2013…”
Section: Data Extraction and Synthesismentioning
confidence: 98%
“…For example, all selected researches have been thoroughly studied and analyzed in order to assign them to corresponding category. Similarly, each selected research is intensively studied and Di et al, 2013, Berrani et al, 2013, Stancescu et al, 2010, Ouchani et al, 2013, Bouquet et al, 2012, DeTommasi et al, 2013, Andrade et al, 2009, Bazydlo et al, 2014, Doligalski and Adamski, 2013, Mueller et al, 2010, Durand and Bonato, 2012, Moreira et al, 2010, Vidal et al, 2009, Linehan and Clarke, 2012, Herrera et al, 2014, Lecomte et al, 2011, Rafiq Quadri et al, 2012, Chen et al, 2013, Vanderperren et al, 2008, Elhaji et al, 2012, Riccobene and Scandurra, 2012Zohaib Iqbal et al, 2013, Chouali and Hammad, 2011, Doering, 2014, Ouchani et al, 2014, Telinski Wiedermann anger et al, 2013, Knorreck and Apvrille, 2011, Ge et al, 2012, Baresi et al, 2013, Huang et al, 2012, Nguyen et al, 2014, Bousse et al, 2012 Modeling 5 Gomez et al, 2012, Penil et al, 2010, Espinoza et al, 2009, Rota Sena Marques et al, 2014, Behjati et al, 2011 Property specification 2 Yin et al, 2013…”
Section: Data Extraction and Synthesismentioning
confidence: 98%
“…Based on such a structured description, EAST-ADL also provides necessary modeling support for functional safety [18]. Moreover, through its support for behavior description, the modeling framework also allows the developers to precisely capture various behavioral concerns in requirements engineering, system design, and safety engineering [19]. However, although constituting a very good basis for capturing and formalizing various aspects of ITS, current EAST-ADL does not provide any explicit methodology on the modeling and analysis of ITS systems in regard to the emergent properties and safety issues.…”
Section: The Modeling Frameworkmentioning
confidence: 99%
“…In [10] and [11], authors discuss analysis of EAST-ADL models, focusing on model checking using SPIN, safety analysis using Hip-Hops and some timing analysis. This work is later completed in [12] and addresses optimizations of architectures through specific analysis combined to multi-domain optimization techniques based on genetic algorithms.…”
Section: B Autosar and East-adlmentioning
confidence: 99%