Computer Science ›› 2019, Vol. 46 ›› Issue (8): 217-223.doi: 10.11896/j.issn.1002-137X.2019.08.036
• Software & Database Technology • Previous Articles Next Articles
LI Mi, ZHUANG Yi, HU Xin-wen
CLC Number:
[1]FEILER P H,GLUCH D P,HUDAK J J.The architecture ana- lysis & design language (AADL):An introduction[R].Pittsburgh:Carnegie-Mellon Univ Pittsburgh PA Software Enginee-ring Inst,2006. [2]LI J Y,CAO Z N.An AADL Modeling Method Based on Concurrency[J].Computer & Modernization,2017(5):1-4. [3]ZHOU D X,LI N,LIU Z X.Modeling and Analysis of Avionics Configurations Control System Based on AADL[J].Computer Science,2016,43(S1):55-59. [4]WEI X,DONG Y W,YANG M,et al.Hazard analysis for AADL model[C]∥Proceedings of the 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications.Chongqing,China:IEEE,2014:1-10. [5]MUNOZ M.Space systems modeling using the Architecture Analysis & Design Language (AADL)[C]∥2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).Pasadena:IEEE,2013:97-98. [6]YANG Z B,PI L,HU K,et al.AADL:An architecture design and analysis language for complex embedded real-time systems[J].Journal of Software,2010,21(5):899-915. [7]ZHANG X C,YAN X F,ZHOU Y.A Method for Conversion of AADL Model into Dynamic Fault Tree[J].Computer Technology and Development,2017,27(11):110-114. [8]LI D M,LI J,LIN H F.Reliability Analysis Method of Embedded System AADL Model Based on Fault Tree Analysis[J].Computer Science,2017,44(6):182-188. [9]SPIVEY J M,ABRIAL J.The Z notation [M].Hemel Hempstead:Prentice Hall,1992. [10]SMITH G.The Object-Z specification language[M].New York:Springer Science & Business Media,2012. [11]LANO K,HAUGHTON H.The z++ manual[M].Lloyds Re- gister of Shipping,1994:29-62. [12]FISCHER C.CSP-OZ:a combination of Object-Z and CSP[M]∥ Formal Methods for Open Object-based Distributed Systems.Springer,Boston,MA,1997:423-438. [13]SMITH G,LI Q.Maze:An extension of object-z for multi-agent systems[C]∥International Conference on Abstract State Machines,Alloy,B,TLA,VDM,and Z.Berlin Heidelberg:Sprin-ger,2014:72-85. [14]NAJAFI M,HAGHIGHI H.An integration of UML-B and object-Z in software development process [J].Lecture Notes in Electrical Engineering,2013,152:633-648. [15]NI S R,ZHUANG Y,CAO Z N,et al.Modeling dependability features for real-time embedded systems [J].IEEE Transactions on Dependable and Secure Computing,2015,12(2):190-203. [16]ABRAHAM E,JANSEN N,WIMMER R,et al.DTMC model checking by SCC reduction[C]∥2010 Seventh International Conference on the Quantitative Evaluation of Systems.Williamsburg:IEEE,2010:37-46. [17]CHENG Y H,HUANG Z Q,KAN S L.A system dependability modeling method using AADL and IMC[J].Computer Engineering & Science,2015,37(8):1517-1524. [18]BOUDALI H,CROUZEN P,HAVERKORT B,et al.Arcade-A formal,extensible,model-based dependability evaluation framework[C]∥13th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2008).Belfast:IEEE,2008:243-248. [19]GAO Z W.Reliability Modeling and Evaluation of Embedded Software Based on AADL[D].Xi’an:Xidian University,2011. |
[1] | ZHANG Zhi-long, SHI Xian-jun, QIN Yu-feng. Diagnosis Strategy Optimization Method Based on Improved Quasi Depth Algorithm [J]. Computer Science, 2022, 49(6A): 729-732. |
[2] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[3] | LIU Kai-xiang, XIE Yong-fang, CHEN Xin, LYU Fei, LIU Jun-jiao. Industrial Serial Protocol State Detection Algorithm Based on DTMC [J]. Computer Science, 2022, 49(3): 301-307. |
[4] | FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346. |
[5] | QI Hui, SHI Ying, LI Deng-ao, MU Xiao-fang, HOU Ming-xing. Software Reliability Prediction Based on Continuous Deep Confidence Neural Network [J]. Computer Science, 2021, 48(5): 86-90. |
[6] | FENG Kai, MA Xin-yu. Subnetwork Reliability of (n,k)-bubble-sort Networks [J]. Computer Science, 2021, 48(4): 43-48. |
[7] | CUI Jian-qun, HUANG Dong-sheng, CHANG Ya-nan, WU Shu-qing. Congestion Control Based on Message Quality and Node Reliability in DTN [J]. Computer Science, 2021, 48(4): 268-273. |
[8] | FENG Kai, LI Jing. Study on Subnetwork Reliability of k-ary n-cubes [J]. Computer Science, 2020, 47(7): 31-36. |
[9] | WANG Hui-yan, XU Jing-wei, XU Chang. Survey on Runtime Input Validation for Context-aware Adaptive Software [J]. Computer Science, 2020, 47(6): 1-7. |
[10] | CHENG Yu, LIU Wei, SUN Tong-xin, WEI Zhi-gang, DU Wei. Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage [J]. Computer Science, 2020, 47(4): 42-49. |
[11] |
ZHANG Zheng-lin,ZHANG Li-wei,WANG Wen-juan,XIA Li,FU Hao,WANG Hong-zhi,YANG Li-zhuang and LI Hai. Survey on Computerized Neurocognitive Assessment System [J]. Computer Science, 2020, 47(2): 150-156. |
[12] | DING Rong, YU Qian-hui. Growth Framework of Autonomous Unmanned Systems Based on AADL [J]. Computer Science, 2020, 47(12): 87-92. |
[13] | ZHAI Yong, LIU Jin, CHEN Jie, LIU Lei, XING Xu-chao, DU Jiang. Analysis on Mathematical Models of Maintenance Decision and Efficiency Evaluation of Computer Hardware [J]. Computer Science, 2018, 45(6A): 568-572. |
[14] | YI Ze-long, WEN Yu-mei, LIN Yan-min, CHEN Wei-ting and LV Guan-yu. Impacts of Correlation Effects among Multi-layer Faults on Software Reliability Growth Processes [J]. Computer Science, 2018, 45(2): 241-248. |
[15] | WU Wen-hua, SONG Ya-fei, LIU Jing. Dynamic Reliability Evaluation Method of Evidence Based on Intuitionistic Fuzzy Sets and Its Applications [J]. Computer Science, 2018, 45(12): 160-165. |
|