Buch, Englisch, Band 632, 128 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 3435 g
The Specification PEARL Approach
Buch, Englisch, Band 632, 128 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 3435 g
Reihe: Studies in Computational Intelligence
ISBN: 978-3-319-28903-8
Verlag: Springer International Publishing
This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way.
Three ultimate goals are being followed in the course of defining this new PEARL standard, namely:
1. simplicity over complexity,
2. inherent real-time ability, and
3. conformity to safety integrity and security capability levels.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Drahtlostechnologie
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Mobilfunk- und Drahtlosnetzwerke & Anwendungen
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Mathematik | Informatik EDV | Informatik Technische Informatik Eingebettete Systeme
- Technische Wissenschaften Technik Allgemein Mess- und Automatisierungstechnik
Weitere Infos & Material
Introduction.- Specification PEARL Language.- Specification PEARL Methodology.- UML 2 Profile for Specification PEARL.-UML Safety Pattern for Specification PEARL.- Specification PEARL Security.- Evaluation of the Methodology.- Conclusion.