Ocarina: AAAn environment for AADL models analysis and automatic code generation for high integrity applications

Gilles Lasnier, Bechir Zalila, Laurent Pautet, Jérome Hugues

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Developing safety-critical distributed applications is a difficult challenge. A failure may cause important damages as loss of human life or mission's failure. Such distributed applications must be designed and built with rigor. Reducing the tedious and error-prone development steps is required; we claim that automatic code generation is a natural solution. In order to ease the process of verification and certification, the user can use modeling languages to describe application critical aspects. In this paper we introduce the use of AST as a modeling language for Distributed Real-time Embedded (DRE) systems. Then we present our tool-suite ocarina which allows automatic code generation from AST models. Finally, we present a comparison between ocarina and traditional approaches.

Original languageEnglish
Title of host publicationReliable Software Technologies - Ada-Europe 2009 - 14th Ada-Europe International Conference on Reliable Software Technologies, Proceedings
Pages237-250
Number of pages14
DOIs
Publication statusPublished - 27 Aug 2009
Externally publishedYes
Event14th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2009 - Brest, France
Duration: 8 Jun 200912 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5570 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2009
Country/TerritoryFrance
CityBrest
Period8/06/0912/06/09

Fingerprint

Dive into the research topics of 'Ocarina: AAAn environment for AADL models analysis and automatic code generation for high integrity applications'. Together they form a unique fingerprint.

Cite this