• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Ning, Du Chenglie, Li Jianliang, Liu Zhiqiang, Peng Han. Analysis and Verification of AADL Hierarchical Schedulers[J]. Journal of Computer Research and Development, 2015, 52(1): 167-176. DOI: 10.7544/issn1000-1239.2015.20130722
Citation: Fu Ning, Du Chenglie, Li Jianliang, Liu Zhiqiang, Peng Han. Analysis and Verification of AADL Hierarchical Schedulers[J]. Journal of Computer Research and Development, 2015, 52(1): 167-176. DOI: 10.7544/issn1000-1239.2015.20130722

Analysis and Verification of AADL Hierarchical Schedulers

More Information
  • Published Date: December 31, 2014
  • In the system based on a hierarchical scheduler, the processor is shared between several collaborative schedulers. Such schedulers are becoming more and more investigated and proposed in reallife applications. For example, the ARINC 653 international standard which defines programming interface for avionic real time operating systems provides such a kind of collaborative schedulers. This article focuses on the modeling and the schedulability analysis of hierarchical schedulers. We investigate the modeling of hierarchical schedulers with architecture analysis and design language (AADL). A model checking based method for analyzing the schedulability of AADL hierarchical schedulers is proposed. The AADL thread components and hierarchical schedulers are modeled as network of timed automatons. The schedulability is described as a set of temporal logic formulas. Then we use a model checker Uppaal to analyze and verify the schedulability of hierarchical schedulers. Our work shows that analyzing schedulability of AADL hierarchical schedulers by model checking is feasible. The method uses an exhaustive method to automate analyze the properties of a system by a model checker. Compared with related works, the proposed method produces more precise results.
  • Related Articles

    [1]He Xianmin, Li Maoxi, He Yanqing. Siamese BERT-Networks Based Classification Mapping of Scientific and Technological Literature[J]. Journal of Computer Research and Development, 2021, 58(8): 1751-1760. DOI: 10.7544/issn1000-1239.2021.20210323
    [2]Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
    [3]Zhou Quanbiao, Zhang Xingjun, Liang Ningjing, Huo Wenjie, Dong Xiaoshe. FTL Address Mapping Method Based on Mapping Entry Inter-Reference Recency[J]. Journal of Computer Research and Development, 2018, 55(5): 1065-1077. DOI: 10.7544/issn1000-1239.2018.20170254
    [4]Wang Yizhuo, Zuo Qi, Ji Weixing, Wang Xiaojun, Shi Feng. Memory-Aware Incremental Mapping of Applications to MPSoC[J]. Journal of Computer Research and Development, 2015, 52(5): 1198-1209. DOI: 10.7544/issn1000-1239.2015.20131960
    [5]Zhu Hong, Ding Shifei, Xu Xinzheng. An AP Clustering Algorithm of Fine-Grain Parallelism Based on Improved Attribute Reduction[J]. Journal of Computer Research and Development, 2012, 49(12): 2638-2644.
    [6]Zuo Yayao, Tang Yong, Shu Zhongmei. Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping[J]. Journal of Computer Research and Development, 2012, 49(11): 2320-2327.
    [7]Zhu Sifeng, Liu Fang, Chai Zhengyi, Qi Yutao. Immune-Computing-Based Location Planning of Base Station and Relay Station in IEEE 802.16j Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1649-1654.
    [8]Li Xiaoling, Guo Changguo, Li Xiaoyong, Wang Huaimin. A Constraint Optimization Based Mapping Method for Virtual Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1601-1610.
    [9]Cao Chunjie, Yang Chao, Ma Jianfeng, Zhu Jianming. An Authentication Protocol for Station Roaming in WLAN Mesh[J]. Journal of Computer Research and Development, 2009, 46(7): 1102-1109.
    [10]Yang Renzhong, Hou Zifeng, Li Jingxia. A Resource Reservation Scheme for PCF Handoff Station in WLAN[J]. Journal of Computer Research and Development, 2005, 42(11): 1962-1968.

Catalog

    Article views (1323) PDF downloads (674) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return