Automated Protocol Implementations Based on Activity Threads

نویسندگان

  • Peter Langendörfer
  • Hartmut König
چکیده

In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reordering of statements at compile time. This simplifies the mapping process and considerably improves the efficiency of the generated code. The approach is implemented in the SDL compiler COCOS. We describe the approach as well as its implementation and prove how semantic conflicts are resolved. Finally we present measurements which show the achieved performance gain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Derivation of Efficient Implementations from SDL Specifications

Protocol implementations automatically derived from formal descriptions do not fulfill the performance requirements of most high-speed applications. On the other hand, automated implementation techniques may bring remarkable benefits for the quality of implementations. In the paper, we present an approach to automatically derive efficient implementations from SDL specifications. Our approach is...

متن کامل

Derivation of efficient implementations from SDL specifications employing data referencing, integrated packet framing and activity threads

Implementations automatically derived from SDL descriptions often do not fulfill the performance requirements of performance-sensitive applications. In the paper, we describe how three different techniques mainly known from the manual implementation of protocol architectures can be applied to automatically derive efficient implementations from SDL specifications. The three techniques are data r...

متن کامل

Priority Inheritance Protocol Proved Correct

In real-time systems with threads, resource locking and priority scheduling, one faces the problem of Priority Inversion. This problem can make the behaviour of threads unpredictable and the resulting bugs can be hard to find. The Priority Inheritance Protocol is one solution implemented in many systems for solving this problem, but the correctness of this solution has never been formally verif...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Automated Modeling of Real-Time Implementation

This paper describes ongoing work on the automatic construction of formal models from Real-Time implementations. The model construction is based on measurements of the timed behavior of the threads of an implementation, their causal interaction patterns and external visible events. A specification of the timed behavior is modeled in timed automata and checked against the generated model in orde...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999