Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-11811-1_37guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Code synthesis for timed automata: a comparison using case study

Published: 22 February 2010 Publication History

Abstract

There are two available approaches to automatically generate implementation code from timed automata model. The first approacch is implemented and attached to TIMES tool [1]. We will call this approach “TIMES approach”. While the second approach is based on using B-method [2] and its available code generation tool [3]. We will call this approach “B-method approach”. We select the model of the production cell to be used as a case study for the comparison between these two approaches. The same production cell model has been used against both approaches. The B-method approach generates platform independent code [4]. So we select the generated code using TIMES to be platform independent too for the comparison purpose. For the B-method approach, we use the deterministic semantic of timed automata which is used for TIMES code generation as given in [5]. This semantic controls the selection of the next executed function. The using of this deterministic mechanism is generally not needed for the code generated by the B-method approach. But we use it as it is the implemented mechanism for the TIMES approach. So we select to use it for comparison purpose. By running the implementation code generated using the B-method approach, it works fine as far as we run and no property violation could be found. On the other hand the code generated using TIMES approach runs successfully for the first 10 action transitions and then it progresses the time infinitely. This means that the system deadlocked, so it violates the first property of the model. While the first property is to guarantee that the system is deadlock free. This deadlock is due to the mishandling of the committed and urgent states [6]. The introduced comparison gave a result that the approach based on the using of B-method generates a verified code (by mean of simulation) and handles more timed automata features.

References

[1]
http://www.it.uu.se/research/group/darts/times/papers/manual.pdf
[2]
Abrial, J.-R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996).
[3]
http://www.tools.clearsy.com/index.php5?title=Tutorial_ComenC
[4]
Ayoub, A., Wahba, A., Salem, A., Taher, M., Sheirah, M.: Automatic Code Generation from Verified Timed Automata Model. To be appear in proceeding of IADIS Applied Computing, Italy (2009).
[5]
Amnell, T., Fersman, E., Pettersson, P., Sun, H., Yi, W.: Code Synthesis for Timed Automata. Nordic Journal of Computing 9(4) (2002).
[6]
http://www.it.uu.se/research/group/darts/papers/texts/new-tutorial.pdf

Cited By

View all
  • (2014)Safety-critical medical device development using the UPP2SF model translation toolACM Transactions on Embedded Computing Systems10.1145/258465113:4s(1-26)Online publication date: 1-Apr-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ABZ'10: Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
February 2010
416 pages
ISBN:3642118100
  • Editors:
  • Marc Frappier,
  • Uwe Glässer,
  • Sarfraz Khurshid,
  • Régine Laleau,
  • Steve Reeves

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 22 February 2010

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Safety-critical medical device development using the UPP2SF model translation toolACM Transactions on Embedded Computing Systems10.1145/258465113:4s(1-26)Online publication date: 1-Apr-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media