Parts of the results of the paper presented at the 17th Annual Workshop on Microprogramming, 1984... more Parts of the results of the paper presented at the 17th Annual Workshop on Microprogramming, 1984SIGLETIB: RN 3147 (94) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische Informationsbibliothekrev. November 1984DEGerman
... Purchase this Book. Source, Pages: 293. Medium: Paperback. Year of Publication: 2001. ISBN:35... more ... Purchase this Book. Source, Pages: 293. Medium: Paperback. Year of Publication: 2001. ISBN:3540620079. Authors, Carlos Delgado Kloos, Editors, W. Damm, ... Collaborative Colleagues: Carlos Delgado Kloos: colleagues. W. Damm: colleagues. ...
Cyber-physical systems combine a cyber side (computing and networking) with a physical side (mech... more Cyber-physical systems combine a cyber side (computing and networking) with a physical side (mechanical, electrical, and chemical processes). In many cases, the cyber component controls the physical side using sensors and actuators that observe the physical system and actuate the controls. Such systems present the biggest challenges as well as the biggest opportunities in several large industries, including electronics, energy, automotive, defense and aerospace, telecommunications, instrumentation, industrial automation. Engineers today do successfully design cyber-physical systems in a variety of industries. Unfortunately, the development of systems is costly, and development schedules are difficult to stick to. The complexity of cyber-physical systems, and particularly the increased performance that is offered from interconnecting what in the past have been separate systems, increases the design and verification challenges. As the complexity of these systems increases, our inabili...
SafeTRANS ist ein gemeinnutziger deutscher Verein, der sich insbesondere zum Ziel gesetzt hat, Pr... more SafeTRANS ist ein gemeinnutziger deutscher Verein, der sich insbesondere zum Ziel gesetzt hat, Prozesse, Methoden und Werkzeuge zu erforschen, die die Entwicklung sicherer Embedded Systems in der Verkehrstechnik zu verbessern. Im Januar 2015 wurde dazu ein Arbeitskreis Hochautomatisierte Systeme: Safety, Testen und Entwicklungsprozesse gegrundet. Hierin wollen Teilnehmer aus unterschiedlichen Bereichen der Verkehrstechnik zusammenarbeiten, um gemeinsame Ansatze fur die Entwicklung und den Test von hochautomatisierten sicherheitskritischen Systemen zu erarbeiten. Als ein erster gemeinsamer Arbeitspunkt wurde die Definition eines interperabelen Umweltmodels fur die Umgebung der mobilen Plattform identifiziert. Dieses Uberblickspaper stellt kurz den Verein SafeTRANS und dessen Arbeitskreis dar und gibt dann einen Uberblick uber die Resultate einschlagiger durch SafeTRANS initiierter Projekte zu Methoden der Modellierung und Absicherung der Mensch-Assistenzsystem-Interaktion und er Sich...
Validation and Verification of Automated Systems, 2019
We demonstrate on a small case study how the scenario subspace of a world model violating a safet... more We demonstrate on a small case study how the scenario subspace of a world model violating a safety property φ can be partitioned into a list of scenarios based on model checking and the Traffic Sequence Chart (TSC) formalism. The presented process therefore iteratively generates scenarios that cover a part of the not yet covered scenario space. The process is guided by counterexamples to the already established list of scenarios and φ. The tool-supported abstraction step of deriving a scenario from a concrete counterexample is driven by the predicates of the symbol dictionary, which is part of any TSC specification Damm et al. TSCs (i) directly provide a visualization of the generated candidate abstractions, to help an expert to determine the right level of abstraction and (ii) formally specify scenarios which enables the outlined analysis tasks supporting the scenario definition.
ATRs (AVACS Technical Reports) are freely downloadable from www.avacs.org Copyright c â—‹ June 2009... more ATRs (AVACS Technical Reports) are freely downloadable from www.avacs.org Copyright c â—‹ June 2009 by the author(s)
During the last few years many different memory consistency protocols have been proposed. These r... more During the last few years many different memory consistency protocols have been proposed. These range from strong models like sequential consistency or processor consistency to weak ones like weak ordering, release consistency and SCNF. Implementations of these protocols are usually transparent to application programs: They try to hide as much detail as possible, usually leaving 'well behaved' applications with a sequential consistent memory view. There are two reasons why a different approach to memory consistency is chosen in this paper. On one hand this transparency of protocols imposes a limit on the amount of information about data access categories that can be given by applications. More information could reduce coherence overhead substantially. On the other hand sequential consistency is not the only feasible programming model for writing parallel programs. Most applications do not rely on the strong limitations given by it, because they synchronize to access shared...
Most strong cache coherence protocols provide a sequential consistent memory model. Weak coherenc... more Most strong cache coherence protocols provide a sequential consistent memory model. Weak coherence models often give an, albeit restricted, view of this model, too. However, there are many different possibilities to write parallel programs and not all of them are based on sequential consistency. This paper presents a new cache coherence protocol that provides many different ways of implementing coherence and synchronization. Using this protocol threads can exploit knowledge about how they use data and decide which coherence scheme to use. An implementation of the protocol in a NUMA environment is described in detail and discussed. Keywords: weak cache coherency, sequential consistency, NUMA. e-mail: Juergen.Risau@informatik.uni-oldenburg.de 1 Introduction Weak cache coherence protocols have been the object of extensive studies (e.g. [Mos93], [GLL + 90], [GGH91], [Ste90], [Egg91], [ZB92]). The goal almost everybody seems to have agreed upon is to provide programmers with a machi...
Parts of the results of the paper presented at the 17th Annual Workshop on Microprogramming, 1984... more Parts of the results of the paper presented at the 17th Annual Workshop on Microprogramming, 1984SIGLETIB: RN 3147 (94) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische Informationsbibliothekrev. November 1984DEGerman
... Purchase this Book. Source, Pages: 293. Medium: Paperback. Year of Publication: 2001. ISBN:35... more ... Purchase this Book. Source, Pages: 293. Medium: Paperback. Year of Publication: 2001. ISBN:3540620079. Authors, Carlos Delgado Kloos, Editors, W. Damm, ... Collaborative Colleagues: Carlos Delgado Kloos: colleagues. W. Damm: colleagues. ...
Cyber-physical systems combine a cyber side (computing and networking) with a physical side (mech... more Cyber-physical systems combine a cyber side (computing and networking) with a physical side (mechanical, electrical, and chemical processes). In many cases, the cyber component controls the physical side using sensors and actuators that observe the physical system and actuate the controls. Such systems present the biggest challenges as well as the biggest opportunities in several large industries, including electronics, energy, automotive, defense and aerospace, telecommunications, instrumentation, industrial automation. Engineers today do successfully design cyber-physical systems in a variety of industries. Unfortunately, the development of systems is costly, and development schedules are difficult to stick to. The complexity of cyber-physical systems, and particularly the increased performance that is offered from interconnecting what in the past have been separate systems, increases the design and verification challenges. As the complexity of these systems increases, our inabili...
SafeTRANS ist ein gemeinnutziger deutscher Verein, der sich insbesondere zum Ziel gesetzt hat, Pr... more SafeTRANS ist ein gemeinnutziger deutscher Verein, der sich insbesondere zum Ziel gesetzt hat, Prozesse, Methoden und Werkzeuge zu erforschen, die die Entwicklung sicherer Embedded Systems in der Verkehrstechnik zu verbessern. Im Januar 2015 wurde dazu ein Arbeitskreis Hochautomatisierte Systeme: Safety, Testen und Entwicklungsprozesse gegrundet. Hierin wollen Teilnehmer aus unterschiedlichen Bereichen der Verkehrstechnik zusammenarbeiten, um gemeinsame Ansatze fur die Entwicklung und den Test von hochautomatisierten sicherheitskritischen Systemen zu erarbeiten. Als ein erster gemeinsamer Arbeitspunkt wurde die Definition eines interperabelen Umweltmodels fur die Umgebung der mobilen Plattform identifiziert. Dieses Uberblickspaper stellt kurz den Verein SafeTRANS und dessen Arbeitskreis dar und gibt dann einen Uberblick uber die Resultate einschlagiger durch SafeTRANS initiierter Projekte zu Methoden der Modellierung und Absicherung der Mensch-Assistenzsystem-Interaktion und er Sich...
Validation and Verification of Automated Systems, 2019
We demonstrate on a small case study how the scenario subspace of a world model violating a safet... more We demonstrate on a small case study how the scenario subspace of a world model violating a safety property φ can be partitioned into a list of scenarios based on model checking and the Traffic Sequence Chart (TSC) formalism. The presented process therefore iteratively generates scenarios that cover a part of the not yet covered scenario space. The process is guided by counterexamples to the already established list of scenarios and φ. The tool-supported abstraction step of deriving a scenario from a concrete counterexample is driven by the predicates of the symbol dictionary, which is part of any TSC specification Damm et al. TSCs (i) directly provide a visualization of the generated candidate abstractions, to help an expert to determine the right level of abstraction and (ii) formally specify scenarios which enables the outlined analysis tasks supporting the scenario definition.
ATRs (AVACS Technical Reports) are freely downloadable from www.avacs.org Copyright c â—‹ June 2009... more ATRs (AVACS Technical Reports) are freely downloadable from www.avacs.org Copyright c â—‹ June 2009 by the author(s)
During the last few years many different memory consistency protocols have been proposed. These r... more During the last few years many different memory consistency protocols have been proposed. These range from strong models like sequential consistency or processor consistency to weak ones like weak ordering, release consistency and SCNF. Implementations of these protocols are usually transparent to application programs: They try to hide as much detail as possible, usually leaving 'well behaved' applications with a sequential consistent memory view. There are two reasons why a different approach to memory consistency is chosen in this paper. On one hand this transparency of protocols imposes a limit on the amount of information about data access categories that can be given by applications. More information could reduce coherence overhead substantially. On the other hand sequential consistency is not the only feasible programming model for writing parallel programs. Most applications do not rely on the strong limitations given by it, because they synchronize to access shared...
Most strong cache coherence protocols provide a sequential consistent memory model. Weak coherenc... more Most strong cache coherence protocols provide a sequential consistent memory model. Weak coherence models often give an, albeit restricted, view of this model, too. However, there are many different possibilities to write parallel programs and not all of them are based on sequential consistency. This paper presents a new cache coherence protocol that provides many different ways of implementing coherence and synchronization. Using this protocol threads can exploit knowledge about how they use data and decide which coherence scheme to use. An implementation of the protocol in a NUMA environment is described in detail and discussed. Keywords: weak cache coherency, sequential consistency, NUMA. e-mail: Juergen.Risau@informatik.uni-oldenburg.de 1 Introduction Weak cache coherence protocols have been the object of extensive studies (e.g. [Mos93], [GLL + 90], [GGH91], [Ste90], [Egg91], [ZB92]). The goal almost everybody seems to have agreed upon is to provide programmers with a machi...
Uploads
Papers