The JavaTime Approach to Mixed Hardware-Software System Design

نویسندگان

  • James Shin Young
  • Josh MacDonald
  • Michael Shilman
  • Abdallah Tabbara
  • Paul Hilfinger
  • Richard Newton
چکیده

"What has been is what will be, and what has been done is what will be done, and there is nothing new under the sun." Abstract We describe an approach for using Java as a basis for a design and specification language for embedded systems and use our JavaTime system to illustrate many of the aspects of the approach. Java is a pragmatic choice for several reasons. Since it is a member of the C " family " of languages, it is familiar to designers. Unlike C and C++, it has standard support for concurrency. Its treatment of arrays permits better static and dynamic error checking than is conveniently feasible in C and C++. Finally, while Java's expressive power is comparable to C++, it is a much simpler language, which greatly eases the task of introducing additional analysis into compilers. Successive, formal refinement is an approach we have developed for specification of embedded systems using a general-purpose programming language. Systems are formally modeled as Abstractable Reactive systems, and Java is used as the design input language. A policy-of-use is applied to Java, in the form of language usage restrictions and class-library extensions, to ensure consistency with the formal model. A process of incremental, user-guided program transformation is used to refine a Java program until it is consistent with the policy-of-use. This approach allows systems design to begin with the flexibility of a general-purpose language, followed by gradual refinement into a more restricted form necessary for specification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Top Down Approach: SIMULINK Mixed Hardware / Software Design

System-level design methodologies have been introduced as a solution to handle the design complexity of mixed Hardware / Software systems. In this paper we describe a system-level design flow starting from Simulink specification, focusing on concurrent hardware and software design and verification at four different abstraction levels: System Simulink model, Transaction Simulink model, Macro arc...

متن کامل

Model Based Design approach for Implementation of PHEV Energy Management

Hardware implementation of the Plug-in hybrid electric vehicles (PHEVs) control strategy is an important stage of the development of the vehicle electric control unit (ECU). This paper introduces Model-Based Design (MBD) approach for implementation of PHEV energy management. Based on this approach, implementation of the control algorithm on an electronic hardware is performed using automatic co...

متن کامل

Generating Mixed Hardware/Software Systems from SDL Specifications

A new approach for the translation of SDL specifications to a mixed hardware/software system is presented. Based on the computational model of communicating extended finite state machines (EFSM) the control flow is separated from data flow of the SDL process. Hence for the first time it is possible to generate a mixed hardware/software implementation of an SDL process. This technique also reduc...

متن کامل

Hardware Modeling in VHDL for Mixed Hardware/Software System Level Co-simulation of Embedded Systems

We present a method for modeling and then simulating a mixed hardware/software embedded system implementation in VHDL starting from a high level design representation. In our approach, a complete system description including the communication interfaces is generated automatically in VHDL: Software is modeled by using behavioral VHDL constructs, annotated with timing information derived from bas...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998