Design for constraint violation detection in safety-critical systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

In safety critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the instant of invocation of the operation. Further, for a specific version in a family of related systems, its intended application and the individual user profiles may play a role in determining the constraints. To promote reuse while allowing customizability, a good design should decouple the operations from their associated constraints. Also, the increased flexibility should not entail significant execution time and memory overheads. The paper presents one such design of an object oriented framework for constraint verification and applies it to our motivational problem in the context of implantable cardiac devices. It also serves a broader objective of cataloging the experience gained in developing safety critical systems. Such a knowledge base will be of practical value to the developer community.

Original languageEnglish (US)
Title of host publicationProceedings - 3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages109-116
Number of pages8
ISBN (Electronic)0818692219, 9780818692215
DOIs
StatePublished - Jan 1 1998
Event3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998 - Washington, United States
Duration: Nov 13 1998Nov 14 1998

Publication series

NameProceedings - 3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998
Volume1998-November

Conference

Conference3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998
CountryUnited States
CityWashington
Period11/13/9811/14/98

Fingerprint Dive into the research topics of 'Design for constraint violation detection in safety-critical systems'. Together they form a unique fingerprint.

Cite this