2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE) 2015
DOI: 10.1109/issre.2015.7381823
|View full text |Cite
|
Sign up to set email alerts
|

Specifying and verifying real-time self-adaptive systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…A SA system transition between petri-nets through these states. This work has been extended in [10] to incorporate temporal constraints by considering the time-based petri-nets [5]. In a similar fashion, Context Petri-Nets (CPN), introduced by Cardozo et al [11], allow dynamic reconfiguration of petri-nets to model adaptation; CPN can be then translated automatically into petri-nets.…”
Section: Related Workmentioning
confidence: 99%
“…A SA system transition between petri-nets through these states. This work has been extended in [10] to incorporate temporal constraints by considering the time-based petri-nets [5]. In a similar fashion, Context Petri-Nets (CPN), introduced by Cardozo et al [11], allow dynamic reconfiguration of petri-nets to model adaptation; CPN can be then translated automatically into petri-nets.…”
Section: Related Workmentioning
confidence: 99%
“…In order to evaluate the performance of the TRG builder and the formal verification components of the ZAFETY tool, we report in the following some measurements performed during the verification of two case studies: the self-adaptive UAV system (i.e., the running example of this article) and the self-adaptive Gas Burner (GB) system (i.e., a smaller example introduced in our previous work [15]). We ran our experiments on a machine equipped with a Intel Xeon E5-2630 at 2.30GHz CPU, 32GB of RAM, the Ubuntu 14.04.3 LTS (GNU/Linux 3.13.0-39-generic x86_64) operating system, and the Java HotSpot 1.8 64-Bit Server virtual machine.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…There is the risk that the proposed zone-based methodology can be applied only to few examples (or to a very limited form of adaptation). We have addressed this risk by applying our method to different case studies including two very common and representative real-time system examples (i.e., the GB system [15] and the UAV system, introduced in this article). Moreover, we compared our work with many other successful state-of-the-art approaches, borrowing some consolidated concepts from them.…”
Section: Threats To Validitymentioning
confidence: 99%
See 1 more Smart Citation
“…Providing evidence that self-adaptation properties are satisfied has long been a topic of intensive research (Luckey and Engels, 2013;Weyns et al, 2010;De La Iglesia and Weyns, 2015;Arcaini et al, 2015;Camilli et al, 2015). Luckey and Engels (2013) used a concrete UML-based CSML (concern specific modelling language) named ACML (Adapt Case Modelling Language) to model structural and behavioural concerns of self-adaptive software systems.…”
Section: Formal Specification and Verification Of Self-adaptive Systemsmentioning
confidence: 99%