调整 发表于 2025-3-26 22:03:26

http://reply.papertrans.cn/83/8265/826465/826465_31.png

欲望小妹 发表于 2025-3-27 05:01:44

A New Strategy for the HRT-HOOD to Ada Mapping been gained into the practical use of Ada 95 for high-integrity applications, of which the Ravenscar Profile is a notable emanation. In this paper we present a new HRT-HOOD to Ada mapping strategy, which aims to overcome the shortcomings we noted in the original one, by leveraging on the better und

协迫 发表于 2025-3-27 08:20:49

Using the AADL to Describe Distributed Applications from Middleware to Software Componentsrchitecture description languages (ADLs) such as the AADL provide adequate syntax and semantics to express all those properties on each component of a system. DRE systems rely on a key component, the middleware, to address distribution issues. In order to build efficient and verifiable systems, the

Cougar 发表于 2025-3-27 12:25:06

http://reply.papertrans.cn/83/8265/826465/826465_34.png

Missile 发表于 2025-3-27 14:43:37

http://reply.papertrans.cn/83/8265/826465/826465_35.png

刚毅 发表于 2025-3-27 19:21:15

Proving Functional Equivalence for Program Slicing in SPARKTMtool that extracts program slices from SPARK procedures and proves that the functionality of the original procedure is equivalent to the functionality of the collection of resulting slices. By showing that the effects of the SPARK statements in the collection of slices has the same effect on the inp

沙发 发表于 2025-3-28 01:21:29

http://reply.papertrans.cn/83/8265/826465/826465_37.png

蚀刻术 发表于 2025-3-28 04:02:45

A Comparison of the Mutual Exclusion Features in Ada and the Real-Time Specification for JavaTMatter case the sharing needs to be implemented by some mechanism that ensures mutually exclusive access, or possibly “concurrent read / exclusive write”. Ada and the Real-Time Specification for Java have taken different approaches to mutual exclusion. This paper analyzes and compares them with respe

micronutrients 发表于 2025-3-28 09:34:20

http://reply.papertrans.cn/83/8265/826465/826465_39.png

史前 发表于 2025-3-28 13:34:34

Non-intrusive System Level Fault-Tolerance faults that remain in software after system design and development behave like hardware transient faults: they appear, do the damage and disappear. The conventional approach used for handling task overruns caused by transient faults is to use a single recovery task that implements minimal functiona
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Reliable Software Technology – Ada-Europe 2005; 10th Ada-Europe Inte Tullio Vardanega,Andy Wellings Conference proceedings 2005 Springer-Ve