, Measure of energy consumption, considering the platform only and both the platform and the application
, Titre: High-level frameworks for the specication and verication of scheduling problems
, Actes: International Journal on Software Tools for Technology Transfer (STTT), pp.1-26, 2017.
, Titre: Information Leakage as a Scheduling Resource. Authors: Fabrizio Biondi, Mounir Chadli, Thomas Given-Wilson, Axel Legay. Actes: International Workshop on Formal Methods for Industrial Critical Systems and Automated Verication of Critical Systems (FMICS-AVoCS), vol.10471, pp.83-99, 2017.
, Titre: A Model-Based Framework for the Specication and Analysis of Hierarchical Scheduling Systems
, Actes: International Workshop on Formal Methods for Industrial Critical Systems and Automated Verication of Critical Systems (FMICS-AVoCS), vol.9933, pp.133-141, 2016.
Measuring information leakage using generalized gain functions, 2012. ,
A theory of timed automata, Theor. Comput. Sci, vol.126, issue.2, p.183235, 1994. ,
Optimal paths in weighted timed automata, Theor. Comput. Sci, vol.318, issue.3, p.297322, 2004. ,
Information leakage as a scheduling resource, FMICS-AVoCS, vol.10471, p.8399, 2017.,
URL : https://hal.archives-ouvertes.fr/hal-01382052
A survey of pipelined workow scheduling: Models and algorithms ,
, , vol.45, 2013.
Hierarchical scheduling framework based on compositional analysis using uppaal, Proceedings of the 10th International Symposium on Formal Aspects of Component Software (FACS), Revised Selected Papers, vol.8348, p.6178, 2013. ,
Degree of schedulability of mixedcriticality real-time systems with probabilistic sporadic tasks, Theoretical Aspects of Software Engineering Conference (TASE), p.126130, 2014. ,
Widening the schedulability of hierarchical scheduling systems, Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), vol.8997, p.209227 ,
, , 2015.
Linh Phan Xuan, and Ulrik Nyman. Quantitative schedulability analysis of continuous probability tasks in a hierarchical context, 2015. ,
UPPAAL 4.0, Third International Conference on the Quantitative Evaluation of Systems (QEST), p.125126, 2006. ,
Minimum-cost reachability for priced timed automata, Proceedings of the 4th International Workshop on Hybrid Systems: Computation and Control (HSCC), p.147161, 2001. ,
Flexible framework for statistical schedulability analysis o probabilistic sporadic tasks, 18th International Symposium of Real-Time Distributed Computing (ISORC) ,
Automatic discovery and quantication of information leaks, S&P, p.141153, 2009. ,
Quantifying information leakage of randomized protocols, Theor. Comput. Sci, vol.597, p.6287, 2015.,
URL : https://hal.archives-ouvertes.fr/hal-01242614
QUAIL: A quantitative security analyzer for imperative code,
URL : https://hal.archives-ouvertes.fr/hal-01242615
, LNCS, vol.8044, p.702707, 2013.
Preemptively scheduling hard-real-time sporadic tasks on one processor, Proceedings of the 11th Real-Time Systems Symposium, p.182190, 1990. ,
Detection of Abrupt Changes: Theory and Application, 1993.,
URL : https://hal.archives-ouvertes.fr/hal-00008518
Developing critical embedded systems on multicore architectures: the PRELUDE-SCHEDMCORE toolset, p.107116, 2011.,
URL : https://hal.archives-ouvertes.fr/inria-00618587
Flexible plan verication: Feasibility results, Fundam. Inform, vol.107, issue.2-3, p.111137, 2011. ,
A model-based framework for the specication and analysis of hierarchical scheduling systems, Proceedings of the Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verication of Critical Systems (FMICS-AVoCS), vol.9933, p.133141, 2016. ,
Leakwatch: Estimating information leakage from java programs, LNCS, vol.8713, pp.219-236, 2014.,
URL : https://hal.archives-ouvertes.fr/hal-01097603
The impressive power of stopwatches, Proceedings of the 11th International Conference on Concurrency Theory (CONCUR), p.138152, 2000. ,
Dynamic controllability of disjunctive temporal networks: Validation and synthesis of executable strategies, Proceedings of the 30th AAAI Conference on Articial Intelligence, p.31163122, 2016. ,
Validating domains and plans for temporal planning via encoding into innite-state linear temporal logic, Proceedings of the 31st AAAI Conference on Articial Intelligence, p.35473554, 2017. ,
Computing information ow using symbolic model-checking ,
, Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, vol.29, p.505516, 2014.
, Axel Legay, and Marius Miku£ionis. Optimizing control strategy using statistical model checking
, NASA Formal Methods: Proceedings of the 5th International Symposium (NFM), p.352367, 2013.
Statistical model checking for stochastic hybrid systems, Proceedings of the First International Workshop on Hybrid Systems and Biology (HSB), vol.92, p.122136, 2012.,
URL : https://hal.archives-ouvertes.fr/hal-01088197
Statistical model checking for networks of priced timed automata, Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), vol.6919, p.8096, 2011. ,
Uppaal SMC tutorial, International Journal on Software Tools for Technology Transfer, p.119, 2015. ,
Schedulability of herschel-planck revisited using statistical model checking, Proceedings of 5th International Symposium ISoLA, Part II, vol.7610, p.293307, 2012. ,
, , 2011.
Bounds for certain multiprocessing anomalies, The Bell System Technical Journal, vol.45, issue.9, p.15631581, 1966. ,
Eclipse Modeling Project: A Domain-Specic Language (DSL) Toolkit, 2008. ,
The Theory of Hybrid Automata, p.265292 ,
, , 2000.
A Constraint-based Variability Modeling Framework, International Journal on Software Tools for Technology Transfer (STTT), vol.14, issue.5, p.511530, 2012. ,
Resource-parameterized timing analysis of real-time systems, Hardware and Software: Verication and Testing: Proceeding of the 11th ,
, International Haifa Verication Conference (HVC), p.190205, 2015.
Resource-parameterized timing analysis of real-time systems, LNCS, vol.9434, pp.190-205, 2015. ,
Optimizing the resource requirements of hierarchical scheduling systems, SIGBED Rev, vol.13, issue.3, p.4148, 2016. ,
Optimizing the resource requirements of hierarchical scheduling systems, SIGBED Review, vol.13, issue.3, p.4148, 2016. ,
The ins and outs of the probabilistic model checker mrmc. Performance evaluation, vol.68, p.90104, 2011. ,
Statistical model checking: An overview, Proceedings of the First International Conference on Runtime Verication (RV), vol.6418, p.122135,
URL : https://hal.archives-ouvertes.fr/inria-00591593
, , 2010.
Scheduling algorithms for multiprogramming in a hard-real-time environment, J. ACM, vol.20, issue.1, p.4661, 1973. ,
Generic avionics software specication, 1990. ,
Variability Management Beyond Feature Models, Computer, vol.46, issue.11, p.4854, 2013. ,
Statistical model checking with change detection, Transactions on Foundations for Mastering Change I, vol.1, p.157179, 2016.,
URL : https://hal.archives-ouvertes.fr/hal-01242138
Response Time Analysis for Fixed-Priority Tasks with Multiple Probabilistic Parameters, RTSS 2013 -IEEE Real-Time Systems Symposium, 2013.,
URL : https://hal.archives-ouvertes.fr/hal-00918566
Analysis of monoprocessor systems, Real-Time Applications with Stochastic Task Execution Times, p.2760, 2007. ,
Fundamental design problems of distributed systems for the hard-real-time environment, 1983. ,
Design and Analysis of Experiments, 2006. ,
Business Process Modelling in the jABC: The One-Thing-Approach, Handbook of Research on Business Process Modeling, 2009. ,
Simplicity as a Driver for Agile Innovation, Computer, vol.43, issue.6, p.9092, 2010. ,
Realtime systems security through scheduler constraints, ECRTS, pp.129-140, 2014. ,
CINCO: A Simplicity-Driven Approach to Full Generation of Domain ,
, Specic Graphical Modeling Tools. Software Tools for Technology Transfer, 2017.
Domain-Specic Code Generator Modeling: A Case Study for Multi-faceted Concurrent Systems, Proc. of the 6th Int. Symp. on Leveraging Applications of Formal Methods, Verication and Validation, Part I (ISoLA), number 8802 in LNCS, p.463480, 2014. ,
A multi-objective large neighborhood search methodology for scheduling problems with energy costs, 2015. ,
, IEEE 27th International Conference on Tools with Articial Intelligence (ICTAI), p.453460, 2015.
Continuous inspection schemes, Biometrika, issue.1/2, p.100115, 1954. ,
CARTS: A tool for compositional analysis of real-time systems, SIGBED Rev, vol.8, issue.1, p.6263, 2011. ,
A generalized model for preventing information leakage in hard real-time systems, 2015. ,
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems, p.1318, 2006. ,
, Eclipse Modeling Framework, 2008.
Hierarchical scheduling framework for virtual clustering of multiprocessors, Euromicro Conference on RealTime Systems, p.181190, 2008. ,
Hierarchical scheduling framework for virtual clustering of multiprocessors, ECRTS, p.181190, 2008. ,
The anml language, ICAPS Poster session, 2008. ,
Periodic resource model for compositional realtime guarantees, Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS), p.213, 2003. ,
Integrating security and real-time requirements using covert channel capacity, IEEE Trans ,
, Knowl. Data Eng, vol.12, issue.6, p.865879, 2000.
Statistical model checking of black-box probabilistic systems, CAV, vol.3114, p.202215 ,
, , 2004.
On statistical model checking of stochastic systems, CAV, vol.3576, p.266280 ,
, , 2005.
Vesta: A statistical model-checker and analyzer for probabilistic systems, Second International Conference on the, p.251252, 2005. ,
Probabilistic preemption control using frequency scaling for sporadic real-time tasks, The 7th IEEE International Symposium on Industrial Embedded Systems, 2012. ,
Precisely measuring quantitative information ow: 10k lines of code and beyond, 2016. ,
, Scheduler-based defenses against cross-vm side-channels, Usenix Security, p.687702, 2014.
Sequential Tests of Statistical Hypotheses, The Annals of Mathematical Statistics, vol.16, issue.2, p.117186, 1945. ,
Taskshuer: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems, RTAS, p.112, 2016. ,
Verication and planning for stochastic processes with asynchronous events ,
, , 2005.
Error control for probabilistic model checking, International Workshop on Verication, Model Checking, and Abstract Interpretation, p.142156, 2006. ,
Practical schedulability analysis for generalized sporadic tasks in distributed real-time systems, Proceedings of the, 2008. ,
, Euromicro Conference on Real-Time Systems, ECRTS '08, p.223232, 2008.
, Example of scheduling two tasks using a non-preemptive Scheduling algorithm
31 2.2 Examples of timed automata with a single clock and one example of the evolution of their clock over time, Light Switch Transition ,
Stochastic dispatcher implemented with a stochastic, p.43 ,
, SWA model of a stochastic task
, Examples of the satisfaction of simple temporal modalities over an execution trace
, Examples of satisfaction of some CTL formula
Graphical representation of the model checking approach, vol.57 ,
, Example of task display generated by the style conguration, p.64
, Main principles of domain-specic tools generation with Cinco, p.64
, Tool chain for generating and using domain-specic analysis frameworks, p.66
, Periodic Resource Model supplier with stochastic budget, p.70
, Example of Hierarchical Scheduling System
, TA template of a stochastic task (T i )
, An action to congure stochastic real-time attributes, p.75
, An action to congure stochastic real-time attributes
, , p.76
, A simulation of PRM behavior model
, Probability density distribution for the budgets for the scheduling unit C1, vol.80
, Hierarchical scheduling of avionic tasks
, 83 5.1 F-distribution example with the p-value computed for F=2.23, p.91
, Platform layer with 2 processors, 3 hard real-time tasks and 1 soft realtime task
Application layer with 3 components and 5 actions, p.99 ,
, Mapping between application layer and platform layer, p.99
, Application layer of our case-study model
, Pareto Eciency diagram for optimizing energy consumption and maximum response time of task T 2
, Example Processes with schedule-dependent condential information leakage
Periodic Solutions for Leakage between hyperperiods, p.115 ,
, Schedulings for the processes in Figure
, Number of failures for each combination of preprocessor and scheduling algorithm, out of ?30,000 experiments, vol.14
, 123 6.6 Information leakage of the solutions for each combination of pre-and postprocessor (except Total Merge) using the EDF scheduling algorithm, p.124