Skip to main content

Model-Based Run-Time Error Detection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5002))

Abstract

The reliability of high-volume products, such as consumer electronic devices, is threatened by the combination of increasing complexity, decreasing time-to-market, and strong cost constraints. As an approach to maintain a high level of reliability and to avoid customer complaints, we present a run-time awareness concept. Part of this concept is the use of models for run-time error detection. We have implemented a general awareness framework in which an application and a model of its desired behaviour can be inserted. It allows both time-based and event-based error detection at run time. This method, coupled to local recovery techniques, aims to minimize any user exposure to product-internal technical errors, thereby improving user-perceived reliability.

This work has been carried out as part of the Trader project under the responsibility of the Embedded Systems Institute. This project is partially supported by the Dutch Ministry of Economic Affairs under the Bsik program.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cronkhite, J.D.: Practical application of health and usage monitoring (HUMS) to helicopter rotor, engine, and drive systems. In: AHS, Proc. 49th Annual Forum, vol. 2, pp. 1445–1455 (1993)

    Google Scholar 

  2. Embedded Systems Institute: Ideals project (2007), http://www.esi.nl/ideals/

  3. van de Laar, P., Golsteijn, R.: User-controlled reflection on join points. Journal of Software 2(3), 1–8 (2007)

    Article  Google Scholar 

  4. Sözer, H., Hofmann, C., Tekinerdogan, B., Aksit, M.: Detecting mode inconsistencies in component-based embedded software. In: DSN Workshop on Architecting Dependable Systems (2007)

    Google Scholar 

  5. Zoeteweij, P., Abreu, R., Golsteijn, R., van Gemund, A.: Diagnosis of embedded software using program spectra. In: Proc. 14th Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2007), pp. 213–220 (2007)

    Google Scholar 

  6. Sözer, H., Tekinerdogan, B.: Introducing recovery style for modeling and analyzing system recovery. In: Proc. Working IEEE/IFIP Conference on Software Architecture (WICSA) (2008)

    Google Scholar 

  7. Embedded Systems Institute: Trader project (2007), http://www.esi.nl/trader/

  8. Larsen, K., Mikucionis, M., Nielsen, B., Skou, A.: Testing real-time embedded software using UPPAAL-TRON: an industrial case study. In: 5th ACM Int. Conf. on Embedded Software (EMSOFT 2005), pp. 299–306. ACM Press, New York (2005)

    Chapter  Google Scholar 

  9. The Mathworks: Matlab/Simulink, (2007), http://www.mathworks.com/

  10. Reactive Systems: Model-Based Testing and Validation with Reactis (2007), http://www.reactive-systems.com/

  11. Neema, S., Bapty, T., Shetty, S., Nordstrom, S.: Autonomic fault mitigation in embedded systems. Engineering Applications of Artificial Intelligence 17, 711–725 (2004)

    Article  Google Scholar 

  12. Parekh, J., Kaiser, G., Gross, P., Valetto, G.: Retrofitting autonomic capabilities onto legacy systems. Cluster Computing 9(2), 141–159 (2006)

    Article  Google Scholar 

  13. Shin, M.E., Paniagua, F.: Self-management of COTS component-based systems using wrappers. In: Computer Software and Applications Conference (COMPSAC 2006), pp. 33–36. IEEE Computer Society, Los Alamitos (2006)

    Chapter  Google Scholar 

  14. Kokar, M.M., Baclawski, K., Eracar, Y.A.: Control theory-based foundations of self-controlling software. IEEE Intelligent Software, 37–45 (1999)

    Google Scholar 

  15. Garlan, D., Cheng, S., Schmerl, B.: Increasing System Dependability through Architecture-based Selfrepair. In: Architecting Dependable Systems, Springer, Heidelberg (2003)

    Google Scholar 

  16. Colin, S., Mariani, L.: Run-time verification. In: Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.) Model-Based Testing of Reactive Systems. LNCS, vol. 3472, pp. 525–555. Springer, Heidelberg (2005)

    Google Scholar 

  17. Chen, F., D’Amorim, M., Rosu, G.: A formal monitoring-based framework for software development and analysis. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol. 3308, pp. 357–372. Springer, Heidelberg (2004)

    Google Scholar 

  18. Sammapun, U., Lee, I., Sokolsky, O.: Checking correctness at runtime using real-time Java. In: Proc. 3rd Workshop on Java Technologies for Real-time and Embedded Systems (JTRES 2005) (2005)

    Google Scholar 

  19. van Weelden, A., Oostdijk, M., Frantzen, L., Koopman, P., Tretmans, J.: On-the-fly formal testing of a smart card applet. In: Int. Conf. on Information Security (SEC 2005), pp. 565–576 (2005)

    Google Scholar 

  20. MPlayer: Open source media player (2007), http://www.mplayerhq.hu/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Holger Giese

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hooman, J., Hendriks, T. (2008). Model-Based Run-Time Error Detection. In: Giese, H. (eds) Models in Software Engineering. MODELS 2007. Lecture Notes in Computer Science, vol 5002. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69073-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69073-3_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69069-6

  • Online ISBN: 978-3-540-69073-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics