Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Periodic resource model for compositional real-time guarantees
This work proposes a resource model to characterize a periodic resource allocation and presents exact schedulability conditions for the proposed resource model under the EDF and RM algorithms, and introduces a composition method that derives the timing requirements of a parent scheduler from the time requirements of its child schedulers in a compositional manner.
Cyber-physical systems: The next computing revolution
The design, construction and verification of cyber-physical systems pose a multitude of technical challenges that must be addressed by a cross-disciplinary community of researchers and educators.
Compositional real-time scheduling framework with periodic model
This paper introduces the periodic resource model to characterize resource allocations provided to a single component and presents exact schedulability conditions for the standard Liu and Layland periodic task model and the proposed periodic resource models under EDF and RM scheduling.
Compositional real-time scheduling framework
This paper develops an exact feasibility condition for a set of bounded- delay tasks over a bounded-delay resource partition model, and presents simulation results to evaluate the overheads that the component demand abstraction results incur in terms of utilization increase.
Hierarchical Scheduling Framework for Virtual Clustering of Multiprocessors
This paper develops techniques to support cluster-based scheduling algorithms, and considers properties that minimize processor utilization of individual clusters.
Compositional Analysis Framework Using EDP Resource Models
This work introduces the explicit deadline periodic (EDP) resource model, and presents compositional analysis techniques under EDF and DM, and shows that these techniques are bandwidth optimal, in that they do not incur any bandwidth overhead in abstraction or composition.
Hierarchical modeling and analysis of embedded systems
The modeling language CHARON is described, which allows specification of architectural as well as behavioral hierarchy and discrete aswell as continuous activities in the design of interacting hybrid systems.
Privacy APIs: access control techniques to analyze and verify legal privacy policies
- M.J. May, Carl A. Gunter, I. Lee
- Computer Science19th IEEE Computer Security Foundations Workshop…
- 5 July 2006
This paper describes techniques to formalize regulatory privacy rules and how to exploit this formalization to analyze the rules automatically and validate the usefulness of the formalism by using the SPIN model checker to verify properties that distinguish the two versions of HIPAA.
Runtime Assurance Based On Formal Specifications
The Monitoring and Checking (MaC) framework which assures the correctness of the current execution at run-time and two languages to specify monitoring scripts and requirements are presented.
Weak Bisimulation for Probabilistic Systems
It is shown that in order to compute weak bisimulation it is sufficient to restrict attention to only a finite number of these computations, and an algorithm is presented which has polynomial-time complexity in the number of states of the transition system.