DocumentCode :
3026068
Title :
Putting detectors in their place [program monitoring]
Author :
Jhumka, Arshad ; Hiller, Martin
Author_Institution :
Dept. of Comput. Sci., Warwick Univ., Coventry, UK
fYear :
2005
fDate :
7-9 Sept. 2005
Firstpage :
33
Lastpage :
42
Abstract :
In this paper, we address the problem of locating detectors in a given program under resource constraints. A detector is a program component that asserts the validity of a predicate in a program. The detector location problem is to identify which program actions need to be monitored by detectors such that certain given dependability properties are met. In this paper, we focus on the following dependability properties: (i) high detection coverage, (ii) low detection latency, and (iii) low false alarms rate. Our main contributions are: (i) we first provide a formal definition of the detector location problem under resource constraints, and (ii) we subsequently show that the problem is NP-complete, (iii) we investigate a special case of the detector location problem that can be solved in polynomial time, and present a sound and complete algorithm that solves the problem. We present an example to show the applicability of our approach, which is intended in the area of dependable embedded systems.
Keywords :
computational complexity; embedded systems; fault tolerant computing; formal specification; system monitoring; NP-complete; dependable embedded system; detector location; fault tolerant computing; formal definition; polynomial time; program action monitoring; resource constraints; Computer science; Delay; Design methodology; Detectors; Embedded system; Fault detection; Fault tolerance; Fault tolerant systems; Monitoring; Polynomials;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering and Formal Methods, 2005. SEFM 2005. Third IEEE International Conference on
Print_ISBN :
0-7695-2435-4
Type :
conf
DOI :
10.1109/SEFM.2005.38
Filename :
1575892
Link To Document :
بازگشت