Specifying and Enforcing Resource Utilization Constraints

نویسندگان

  • Stefen O. Howard
  • Jason O. Hallstrom
چکیده

Embedded networked systems are increasingly complex, requiring development effort that spans a team of designers and implementers. Resource utilization budgets must be carefully specified and enforced to ensure the expected behavior of a composite system. In this paper, we present early results of a project aimed at specifying and enforcing time, space, and power utilization constraints. Our approach consists of programming language extensions that enable these constraints to be made manifest within an implementation, and analysis tools that detect violations. We begin by describing an initial implementation for nesC focused on space utilization, and provide an overview of our ongoing plans. The goal is to elicit early feedback from the target user community.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Software Reliability in Data-centered Software Systems by Enforcing Composition Time Constraints

Specifying and enforcing constraints and invariants such as architectural constraints and data typing, strongly enhances the safety and reliability of the software system. Next to design and development constraints, the composition of software systems in component-based software also introduces composition time constraints and dependencies. In data-centered software systems, for example, the so...

متن کامل

A Common Framework for Classifying and Specifying Deductive Database Updating Problems

In this paper we propose two interpretations of the event rules [Oli91] which provide a common framework for classifying and specifying deductive database updating problems such as view updating, materialized view maintenance, integrity constraints checking, integrity constraints maintenance, repairing inconsistent databases, integrity constraints satisfiability or condition monitoring. Moreove...

متن کامل

At Prototyping Customized Environments for Applications

of increasing complexity within the collaborative domain. The next step will be to model collaborative methods, for instance in the Requirements Engineering field. Modeling methods imply in particular specifying various kinds of constraints, such as consistency and completeness constraints. Active capabilities and contracts (between users and the system for controlling deferred actions enforcin...

متن کامل

A Cloud - based Resource and Service Sharing Platform for Computer and Network Security Education

1. Automated Reasoning about Web Access Control Policies via Answer Set Programming Gail-Joon Ahn*, Joohyung Lee*, Hongxin Hu and Yunsong Meng Summary: We introduce a logic-based policy management approach for XACML (eXtensible Access Control Markup Language), which has become the defacto standard for specifying and enforcing access control policies for various applications and services in curr...

متن کامل

Interactors: Capturing Tradeoos in Bandwidth versus Cpu Usage for Quality of Service Constrained Objects

Complex distributed applications, including virtual environments, and real-time multimedia require performance guarantees in the end-to-end transfer of information across a network. To make such guarantees requires the management of processing, memory, and network resources. This paper describes the Dionisys end-system quality of service (QoS) approach to specifying, translating, and enforcing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006