Real-Time Systems. Design Principles for Distributed Embedded Applications. Herman Kopetz. Second Edition (811374), страница 101
Текст из файла (страница 101)
Computing and Control Engineering Journal.Vol. 11(1). (pp. 6-12).[Bro10] Brooks, F.P. (2010). The Design of Design: Essays from a Computer Scientist. AddisonWesley.[Bun08] Bunge, M. (2008). Causality and Modern Science. Transaction Publishers.[Bur09] Burns, A. & A. Wellings. (2009). Real-Time Systems and Programming Languages:Ada, Real-Time Java and C/Real-Time POSIX. Addison-Wesley.[But04] Buttazzo, G. (2004). Hard Real-Time Computing Systems: Predictable SchedulingAlgorithms and Applications.
Springer Verlag.[CAN90] CAN. (1992). Controller Area Network CAN, an In-Vehicle Serial CommunicationProtocol. SAE Handbook 1992. SAE Press. (pp. 20.341-20.355).[Car08] Cardenas, A., A., S. Amin, & S. Shastry. (2008). Research Challenges for the Securityof Control Systems. Proc. of the Workshop on Hot Topics in Security. Usenix Association.
URL: http://portal.acm.org/citation.cfm?id¼1496671.1496677[Cha09] Chandola, V., A. Banerjee & V. Kumar. (2009). Anomaly Detection: A Survey. ACMComputing Surveys. Vol. 41(3). (pp. 15.1-15.58.)[Che87] Cheng, S.C. (1987). Scheduling Algorithms for Hard Real-Time Systems–A BriefSurvey. In: Hard Real-Time Systems. IEEE Press.[Chu08] Chu, Y., Burns, A. (2008). Flexible Hard Real-Time Scheduling for Deliberative AISystems.
Real-Time Systems Journal. Vol. 40(3). (pp. 241-263).[Cla03]Clark, E., et al. (2003). Counterexample-Guided Abstraction Refinement for SymbolicModel Checking. Journal of the ACM. Vol. 50(5). (pp. 752-794).[Cla88]Clark, D. (1988). The Design Philosophy of the DARPA Internet Protocols. ComputerCommunication Review. Vol. 18(4). (pp. 106-114).[Con02] Constantinescu, C.
(2002). Impact of Deep Submicron Technology on Dependability ofVLSI Circuits. Proc. of DSN 2002. IEEE Press. (pp. 205-209).[Cri89]Cristian, F. (1989). Probabilistic Clock Synchronization. Distributed Computing.Vol. 3. Springer Verlag. (pp. 146-185).[Cum10] Cumming, D.M. (2010). Haven’t found that software glitch, Toyota? Keep trying. LosAngeles Times. March 11, 2010.[Bed08][Ben00]References[Dav79][Dea02][Deg95][Dri03][Dys98][Edm00][Eid06][Eps08][Fei06][Fel04][Fel04a][Fin03][Fis06][Foh94][Fra01][Gad10][Gaj09][Gar75][Gau05][Gra85][Hal05][Hal92][Hal96][Hay90][Hei00]361Davies, C.T.
(1979). Data Processing Integrity. In: Computing Systems Reliability.Cambridge University Press. (pp. 288-354).Deavours, D., et al. (2002). The Mobius framework and its implementation. IEEETrans. on Software Engineering, Vol. 28(10). (pp. 1-15).Degani, A., Shafto, M. & Kirlik, A. (1995). Mode Usage in Automated Cockpits: someInitial Observations. Proc.
of IFAC 1995. IFAC Press. (pp. 1-13).Driscoll, K. et. a. (2003). Byzantine Fault-Tolerance: From Theory to Reality. Proc. ofSAFECOMP 2003. LNCS 2788. Springer Verlag. (pp. 235-248).Dyson, G.B. (1998). Darwin among the Machines—the Evolution of Global Intelligence. Basic Books.Edmonds, B., (2000). Complexity and Scientific Modeling. In: Foundations of Science.Springer Verlag.
(pp. 379-390).Eidson, J. (2006). Measurement, Control and Communication Using IEEE 1588.Springer Verlag.Epstein, S. (2008). Intuition from the Perspective of Cognitive Experiential SelfTheory . In: Intuition in Judgment and Decision Making. Lawrence Erlbaum NewYork. (pp. 23-38).Feiler, P., D. Gluch, & J. Hudak. (2006). The Architecture Analysis and DesignLanguage (AADL): An Introduction.
Report CMU-SEI 2006-TN-011. Software Engineering Institute.Feltovich, P.J., et al. (2004). Keeping it too Simple: How the Reductive TendencyEffects Cognitive Engineering. IEEE Intelligent Systems. May/June 2004, IEEE Press(pp. 90-94).Feldhofer, M., S. Dominikus, & J. Wokerstorfer.
(2004). Strong Authentication forRFID Systems Using the AES Algorithms. LCNS 3156. Springer Verlag. (pp. 357-370).Finkenzeller, K. (2003). RFID Handbook. John Wiley and Sons.Fisher, D.A (2006). An Emergent Perspective on the Operation of System-of-Systems.Carnegie Mellon Software Engineering Institute. CMU/SEI-2006-TR-003. URL:http://www.dtic.mil/cgi-bin/GetTRDoc?Location¼U2&doc¼GetTRDoc.pdf&AD¼ADA449020Fohler, G.
(1994). Flexibility in Statically Scheduled Hard Real-Time Systems. PhDThesis. Institut f€ur Technische Informatik. Technical University of Vienna.Frank, D., et al. (2001). Device Scaling Limits of Si MOSFETs and Their ApplicationDependencies. Proc. of the IEEE. Vol. 89(3).
(pp. 259-288).Gadh, R., et al. (2010). RFID: A unique Radio Innovation for the 21st Century. Proc. ofthe IEEE. Vol. 98(2). (pp. 1541-1680).Gajski, D.D., et al. (2009). Embedded System Design. Springer Verlag.Garey, M.R. & D.S. Johnson.
(1975). Complexity Results for Multiprocessor Scheduling under Resource Constraints. SIAM Journal of Computing. Vol. 4(4). (pp. 397-411).Gaudel, M.C. (2005). Formal Methods and Testing: Hypotheses, and CorrectnessApproximations. Proc. of Formal Methods 2005. LNCS 3582. Springer Verlag.Gray, J. (1985). Why do Computers Stop and What can be done about it? TandemTechnical Report TR85.7. Cupertino, CA.Halford, G.S., et al., How Many Variables Can Humans Process? PsychologicalScience, 2005. 16(1): pp.
70-76.Halbwachs, N., (1992). Synchronous Programming of Reactive Systems. SpringerVerlag.Halford, G.S., W.H. Wilson, & S. Phillips. (1996). Abstraction, Nature, Costs, andBenefits. Department of Psychology, University of Queensland, 4072 Australia.Hayakawa, S.I. (1990). Language in Thought and Action. Harvest Original, San Diego.Heinzelman, W.R., A. Chandrakasan, & H. Balakrishan. (2000). Energy-efficientCommunication Protocol for Wireless Microsensor Networks. Proc. of the 33rd HawaiiInternational Conference on System Science. IEEE Press. (pp.
3722-3725).362[Hen03]ReferencesHenzinger, T., B. Horowitz, & C.M. Kirsch, Giotto: A Time-Triggered Language forEmbedded Programming. Proc. of the IEEE, 2003. 91(1): pp. 84-99.[Her09] Herault, L. (2009). Holistic Approach for Future Energy-Efficient Cellular Networks.Proc. of the Second Japan-EU Symposium on the Future Internet. European Communities Brussels.
(pp. 212-220).[Hme04] Hmelo-Silver, C.E. & M.G. Pfeffer. (2004). Comparing Expert and Novice Understanding of a Complex System from the Perspective of Structures, Behaviors, andFunctions. Cognitive Science, Elsevier, Vol. 28. (pp. 127-138).[Hoe10] Hoefer, C. (2010). Causal Determinism. In: Stanford Encyclopedia of Philosophy.(pp.
1-24). URL: http://plato.stanford.edu/entries/determinism-causal/[Hop78] Hopkins, A.L., T.B. Smith, & J.H. Lala. (1978). FTMP: A Highly Reliable FaultTolerant Multiprocessor for Aircraft Control. Proc. IEEE. Vol 66(10). (pp. 12211239).[Hue08] Huebscher, M.C. & J.A. McCann. (2008). A Survey of Autonomic Computing–Degrees,Models and Applications. ACM Computing Surveys. Vol. 40(3). (pp.
7.1-7.28).[Int09]Intel. (2009). Teraflop Research Chip. URL: http://techresearch.intel.com/articles/Tera-Scale/1449.htm.[ITR09] ITRS Roadmap. (2009). International Technology Roadmap for Semiconductors, 2009Edition. Executive Summary. Semiconductor Industry Association.[Jac07]Jackson, D., M. Thomas, & L.I. Millet. (2007). Software for Dependable Systems:Sufficient Evidence? National Academic Press. Washington.[Jer77]Jerri, A.J.
)1977). The Shannon Sampling Theorem—Its Various Extensions andApplications: A Tutorial Review. Proc. of the IEEE. Vol. 65(11). (pp. 1565-1596).[Joh92]Johnson, S. C., & Butler, R. W. (1992). Design for Validation. IEEE Aerospace andElectronic Systems Magazine. Vol. 7(1). (pp. 38-43).[Jon78]Jones, J., C.
(1978). Design Methods, Seeds of Human Futures. John Wiley.[Jon97]Jones, M. (1997). What really happened on Mars Rover Pathfinder. URL: http://catless.ncl.ac.uk/Risks/19.49.html#subj1.[Jue05]Juels, A. & S.A. Weis. (2005). Authenticating Pervasive Devices with Human Protocols. In: Proc. of CRYPTO 2005. Springer Verlag. (pp. 293-308).[Jur04]Juristo, N., A.M.
Moreno, & S. Vegas, (2004). Reviewing 25 Years of Testing Technique Experiments. In: Empirical Software Engineering, Vol. 9. Springer Verlag.(pp. 7-44)[Kan95] Kantz, H. & C. Koza. (1995). The ELECTRA Railway Signaling-System: FieldExperience with an Actively Replicated System with Diversity. Proc. FTCS 25.(pp. 453-458).[Kar95] Karlson, J. et al. (1995). Integration and Comparison of Three Physical Fault-InjectionExperiments. In: Predictably Dependable Computing Systems. Springer Verlag.[Kea07] Keating, M., et al. (2007).
Low Power Methodology Manual for Chip Design. SpringerVerlag.[Kim94] Kim, K.H. & H. Kopetz. (1994). A Real-Time Object Model RTO.k and an Experimental Investigation of its Potential. Proc. COMPSAC 94. IEEE Press.[Kni86] Knight, J.C. & N.G. Leveson. (1986). An Experimental Evaluation of the Assumptionof Independence in Multiversion Programming. IEEE Trans. Software Engineering.Vol. SE-12(1). (pp. 96-109).[Koo04] Koopman, P. (2004).
Embedded System Security. IEEE Computer, (July 2004). (pp. 95-97.)[Kop03] Kopetz, H, & Suri, N. (2003). Compositional Design of RT Systems: A conceptualBasis for the Specification of Linking Interfaces. Proc. of 6 th ISORC. IEEE Press. (pp.51-59).[Kop03a] Kopetz, H. & G. Bauer. (2003). The Time-Triggered Architecture. Proc. of the IEEE,Vol. 91(1).