Buch, Englisch, Band 632, 128 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 232 g
The Specification PEARL Approach
Buch, Englisch, Band 632, 128 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 232 g
Reihe: Studies in Computational Intelligence
ISBN: 978-3-319-80454-5
Verlag: Springer
This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way.
Three ultimate goals are being followed in the course of defining this new PEARL standard, namely:
1. simplicity over complexity,
2. inherent real-time ability, and
3. conformity to safety integrity and security capability levels.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Mobilfunk- und Drahtlosnetzwerke & Anwendungen
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Technische Wissenschaften Technik Allgemein Mess- und Automatisierungstechnik
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Drahtlostechnologie
- Mathematik | Informatik EDV | Informatik Technische Informatik Eingebettete Systeme
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
Weitere Infos & Material
Introduction.- Specification PEARL Language.- Specification PEARL Methodology.- UML 2 Profile for Specification PEARL.-UML Safety Pattern for Specification PEARL.- Specification PEARL Security.- Evaluation of the Methodology.- Conclusion.