Proceeding International Conference on Dependable Systems and Networks. DSN 2000
DOI: 10.1109/icdsn.2000.857510
|View full text |Cite
|
Sign up to set email alerts
|

Executable assertions for detecting data errors in embedded control systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(37 citation statements)
references
References 14 publications
0
37
0
Order By: Relevance
“…Runtime error detectors are specified by the designer using rule-based templates in [19]. Daikon [15] and DIDUCE [14] are systems which dynamically detects program invariants.…”
Section: Using Program Invariants and Patternsmentioning
confidence: 99%
“…Runtime error detectors are specified by the designer using rule-based templates in [19]. Daikon [15] and DIDUCE [14] are systems which dynamically detects program invariants.…”
Section: Using Program Invariants and Patternsmentioning
confidence: 99%
“…We do not address the problem of tolerating the failure of an entire multicore chip or system software (e.g., RTOS), which can be addressed using space redundancy, for example, by replicating all the channels using triple modular redundancy (TMR). In this paper, errors are assumed to be detected using some existing hardware-or software-based error detection mechanisms that are already available on the target platform (Meixner et al 2008;Al-Asaad et al 1998;Jhumka et al 2002;Hiller 2000). The FTM algorithm employs time-redundant execution of multiple backups to tolerate multiple errors.…”
Section: Fault-tolerant Real-time Schedulingmentioning
confidence: 99%
“…Errors are assumed to be detected using some existing hardware/software based error-detection mechanisms, for example, built-in error detection capabilities in modern processors (Meixner et al 2008;Al-Asaad et al 1998) or executable assertions (Jhumka et al 2002;Hiller Hiller:2000), etc. The analysis presented in this paper is not changed for undetected errors.…”
Section: Error Fault and Application Modelmentioning
confidence: 99%
“…Even with access to source code, legal reasons may prohibit modifying the code. Typical robustness enhancing modifications include addition of error checking and handling code, such as executable assertions [Voas and Miller, 1994b;Hiller, 2000]. For systems geared towards high performance it may not be viable to add time-consuming checks to the components involved, especially for general-purpose systems such as OS's.…”
Section: Robustness Enhancing Wrappersmentioning
confidence: 99%