Yu et al., 2019 - Google Patents
Verification Method of Airborne Software for Aviation Safety based on ModelYu et al., 2019
- Document ID
- 7150891407065710448
- Author
- Yu L
- Kang S
- Xin L
- Publication year
- Publication venue
- 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
External Links
Snippet
This paper discusses the difference between traditional software development and model- based software development. The characteristics and advantages of model-based software development and verification are analyzed. This paper introduces the airborne software …
- 238000004458 analytical method 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bozzano et al. | The COMPASS approach: Correctness, modelling and performability of aerospace systems | |
Wang et al. | An exploratory study of autopilot software bugs in unmanned aerial vehicles | |
CN108509336A (en) | A kind of operating system canonical form chemical examination card and test method | |
Bochot et al. | Model checking flight control systems: The Airbus experience | |
Backes et al. | Requirements analysis of a quad-redundant flight control system | |
CN110134599B (en) | System architecture error behavior verification method and device | |
Gigante et al. | Formal methods in avionic software certification: the DO-178C perspective | |
Singh et al. | Software reliability early prediction in architectural design phase: Overview and Limitations | |
Utting | Position paper: Model-based testing | |
CN103970654B (en) | Software reliability virtual test method | |
Bernaerts et al. | Validating industrial requirements with a contract-based approach | |
Brown et al. | Software testing | |
Elmqvist et al. | Safety-oriented design of component assemblies using safety interfaces | |
Yu et al. | Verification Method of Airborne Software for Aviation Safety based on Model | |
Arcaini et al. | Offline model-based testing and runtime monitoring of the sensor voting module | |
de la Vara et al. | A proposal for the classification of methods for verification and validation of safety, cybersecurity, and privacy of automated systems | |
Kacimi et al. | Creating a reference technology platform: Performing model-based safety analysis in a heterogeneous development environment | |
Brown et al. | Guidance for using formal methods in a certification context | |
Marinescu et al. | Automatic test generation for energy consumption of embedded systems modeled in EAST-ADL | |
Abraham | Verification and validation spanning models to code | |
Kim et al. | Assessment of high integrity software components for completeness, consistency, fault-tolerance, and reliability | |
Ackermann et al. | Model based design verification: A monitor based approach | |
Blanquart et al. | Software safety-a journey across domains and safety standards | |
Wang et al. | Test suite generation for ctcs-3 train control system based on taio and mutation theory | |
Mavridou et al. | Bridging the Gap Between Requirements and Model Analysis: Evaluation on Ten Cyber-Physical Challenge Problems |