Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 15 - 2019

No.1 January 2019
No.1 January 2019
No.2 February 2019
No.2 February 2019
No.3 March 2019
No.3 March 2019

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018
No.10 October 2018
No.10 October 2018
No.11 November 2018
No.11 November 2018
No.12 December 2018
No.12 December 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

 

Software Dependability Modeling Using AADL (Architecture Analysis and Design Language)

Volume 7, Number 4, July 2011 - Paper 2 - pp. 313-325

ANA-ELENA RUGINA1, KARAMA KANOUN2,3, and MOHAMED KAANICHE2,3

1 EADS ASTRIUM, 31 Avenue des Cosmonautes, 31402 Toulouse - France
2 LAAS-CNRS, 7 av. Colonel Roche, 31077 Toulouse – France
3 Université de Toulouse; UPS, INSA, INP, ISAE ; LAAS ; F-31077 Toulouse – France

(Received on March 10, 2010 and revised on March 31, 2011)


Abstract:

In traditional development processes, each type of analysis is generally based on a dedicated model, which requires substantial amount of training to be used effectively. Performing dependability evaluation along with other analyses at architectural level allows both making architectural tradeoffs and predicting the effects of architectural decisions on the dependability of an application. This paper is related to the building of dependability models for architectural software systems using the AADL (Architecture Analysis and Design Language). It presents reusable modeling patterns for fault-tolerant applications and shows how the presented patterns can be used in the context of a subsystem of a real-life application.

 

References: 26

Click here to download the paper.

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 

CURRENT ISSUE

Prev Next

Cascaded Trust Network-based Block-Incremental Recommendation Strategy

Shujuan Ji, Da Li, Qing Zhang, Chunjin Zhang, and Chunxiao Bao

Read more

Cuckoo-based Malware Dynamic Analysis

Lele Wang, Binqiang Wang, Jiangang Liu, Qiguang Miao, and Jianhui Zhang

Read more

Colorization for Anime Sketches with Cycle-Consistent Adversarial Network

Guanghua Zhang, Mengnan Qu, Yuhao Jin, and Qingpeng Song

Read more

Bayesian Network Model for Learning Arithmetic Concepts

Yali Lv, Tong Jing, Yuhua Qian, Jiye Liang, Jianai Wu, and Junzhong Miao

Read more

Collaboration System Design of the Transportation Platform

Zhongwen Wang, Dong Liang, Ruizhen Duan, and Mingshan Chi

Read more

Specific Emitter Identification based on Power Amplifier

Zhen Zhang, Jie Chang, Mengqiu Chai, and Nan Tang

Read more

NRSSD: Normalizing Received Signal Strength to Address Device Diversity Problem in Fingerprinting Po…

Chunxiu Li, Jianli Zhao, Qiuxia Sun, Xiang Gao, Guoqiang Sun, and Chendi Zhu

Read more

Fast AIS Data Decoding Algorithm for Multi-Core CPU

Xiangkun Zeng, Huaran Yan, Yingjie Xiao and Xiaoming Yang

Read more
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com