A Survey of Model Extraction Techniques based on Development Artifacts of Embedded Systems

被引:0
|
作者
Yamamoto R. [1 ]
Yoshida N. [2 ]
Takada H. [2 ]
机构
[1] National Institutes of Technology, Tomakomai College
关键词
Compendex;
D O I
10.11309/jssst.39.3_4
中图分类号
学科分类号
摘要
Embedded system is a computer system that is embedded in various devices. Compared to enterprise systems, embedded systems require not only interaction with users but also interaction with hardware devices. Therefore, the characteristics of the development artifacts are different from enterprise systems. In this paper, we focus on the source code and requirement specifications of embedded systems, and explain the analysis methods to support the extraction and understanding of technical debts that reduce the efficiency of reuse and maintenance. In the analysis of requirements specifications, we found that analysis based on domain knowledge and domain constraints are challenges, and that there is a high demand for high-level functional safety. For source code analysis, the issues are the granularity of the analysis, the usage of dynamic analysis by runtime information, and the usage of technology to obtain information near to runtime information statically. © 2022 Japan Society for Software Science and Technology. All rights reserved.
引用
收藏
页码:4 / 16
页数:12
相关论文
共 50 条
  • [1] Ionic liquid–based aqueous biphasic systems as sustainable extraction and separation techniques
    Basaiahgari, Anusha
    Gardas, Ramesh L.
    Current Opinion in Green and Sustainable Chemistry, 2021, 27
  • [2] Techniques and challenges of automatic text extraction in complex images: A survey
    Sumathi, C.P.
    Santhanam, T.
    Priya, N.
    Journal of Theoretical and Applied Information Technology, 2012, 35 (02): : 225 - 235
  • [3] A comparative Study of Model-Based and Data-Based Model Order Reduction Techniques for Nonlinear Systems
    Aizad, T.
    Maganga, O.
    Sumislawska, M.
    Burnham, K. J.
    PROGRESS IN SYSTEMS ENGINEERING, 2015, 366 : 83 - 88
  • [4] A survey of inequality techniques for stability analysis of time-delay systems
    Chen, Jun
    Park, Ju H.
    Xu, Shengyuan
    Zhang, Baoyong
    International Journal of Robust and Nonlinear Control, 2022, 32 (11): : 6412 - 6440
  • [5] A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques
    Lyu, Minzhao
    Gharakheili, Hassan Habibi
    Sivaraman, Vijay
    arXiv, 2022,
  • [6] Enhancing the Security for Smart Card-Based Embedded Systems
    Kalyana Abenanth, G.
    Harish, K.
    Sachin, V.
    Rushyendra, A.
    Mohankumar, N.
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 75 : 673 - 686
  • [7] Modeling and analysis for interrupt behaviors of embedded systems based on EDSPN
    Wang, Jie (wangjie1003@163.com), 1600, Northeast University (35):
  • [8] A reusable agent-based framework for smart embedded systems
    Studentu¸ g. 50, LT-51368, Kaunas, Lithuania
    Diffus Def Data Pt B, 1600, (227-232):
  • [9] A benign hardware Trojan on FPGA-based embedded systems
    Department of Computer Science, University of California, Los Angeles , Los Angeles, CA, United States
    Proc. - Int. Conf. Field Programmable Logic Appl., FPL, (464-470):
  • [10] Application of error estimating model to control quality in embedded software development
    Omron Software Co., Ltd., Shiokoji Horikawa, Shimogyo-ku, Kyoto 600-8234, Japan
    不详
    不详
    不详
    不详
    IEEJ Trans. Electron. Inf. Syst., 3 (496-502+19):