We present an approach for optimization of assertion placement in time-constrained HW/SW modules for detection of errors due to transient and intermittent faults. During the design phases, these assertions have to be inserted into the executable code and, hence, will always be executed with the corresponding code branches. As the result, they can significantly increase execution time of a module, in particular, contributing to a much longer execution of the worst case, and cause deadline misses. Assertions have different characteristics such as tightness (or "local error coverage") and execution latency. Taking into account these properties can increase efficiency of assertion checks in time-constrained embedded HW/SW modules. We have devel...
This paper proposes a lightweight checkpointing scheme for real-time embedded systems. The goal is t...
An important goal of embedded system co-synthesis is to realize system designs under constraints on ...
Distributed algorithms can use executable assertions derived from program verification to detect err...
Technology shrinking and sensitization have led to more and more transient faults in embedded system...
Run-time assurance of a distributed system can be obtained by comparing, at run-time, the behavior o...
Over the design of software (SW) used in provisioning of dependable services, Executable Assertions ...
Over the design of software (SW) used in provisioning of dependable services, Executable Assertions ...
This thesis deals with algorithms that optimize the implementation of the error detection technique ...
An important aspect in the development of dependable software is to decide where to locate mechanism...
International audienceThe design of today's embedded systems requires a complex verification process...
Assertion checking is a technique widely used to discover inconsistencies between specified behavior...
In this paper the behavior of assertion-based error detection mechanisms is characterized under faul...
Dynamically testing software that has been augmented with assertions increases the defect observabil...
An important aspect in the development of dependable software is to decide where to locate mechanism...
Executable assertions can be inserted into a program to nd software faults. Unfortunately, the proce...
This paper proposes a lightweight checkpointing scheme for real-time embedded systems. The goal is t...
An important goal of embedded system co-synthesis is to realize system designs under constraints on ...
Distributed algorithms can use executable assertions derived from program verification to detect err...
Technology shrinking and sensitization have led to more and more transient faults in embedded system...
Run-time assurance of a distributed system can be obtained by comparing, at run-time, the behavior o...
Over the design of software (SW) used in provisioning of dependable services, Executable Assertions ...
Over the design of software (SW) used in provisioning of dependable services, Executable Assertions ...
This thesis deals with algorithms that optimize the implementation of the error detection technique ...
An important aspect in the development of dependable software is to decide where to locate mechanism...
International audienceThe design of today's embedded systems requires a complex verification process...
Assertion checking is a technique widely used to discover inconsistencies between specified behavior...
In this paper the behavior of assertion-based error detection mechanisms is characterized under faul...
Dynamically testing software that has been augmented with assertions increases the defect observabil...
An important aspect in the development of dependable software is to decide where to locate mechanism...
Executable assertions can be inserted into a program to nd software faults. Unfortunately, the proce...
This paper proposes a lightweight checkpointing scheme for real-time embedded systems. The goal is t...
An important goal of embedded system co-synthesis is to realize system designs under constraints on ...
Distributed algorithms can use executable assertions derived from program verification to detect err...