Acknowledgement
Supported by : 한국연구재단, 정보통신기술진흥센터
References
- Mijat, Roberto, and Andy Nightingale. "Virtualization is coming to a platform near you," ARM White Paper, 2011.
- Hwang, Joo-Young, et al., "Xen on ARM: System virtualization using Xen hypervisor for ARM-based secure mobile phones," Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE. IEEE, 2008.
- Behrmann, Gerd, et al., "UPPAAL 4.0," Quantitative Evaluation of Systems, 2006. QEST 2006. Third International Conference on. IEEE, 2006.
- Clarke, Edmund M., Orna Grumberg, and Doron Peled. Model checking. MIT press, 1999.
- Shin, Insik, and Insup Lee, "Compositional real-time scheduling framework with periodic model," ACM Transactions on Embedded Computing Systems (TECS) 7.3 (2008): 30.
- Carnevali, Laura, Alessandro Pinzuti, and Enrico Vicario, "Compositional verification for hierarchical scheduling of real-time systems," Software Engineering, IEEE Transactions on 39.5 (2013): 638-657. https://doi.org/10.1109/TSE.2012.54
- Boudjadar, Jalil, et al., "Hierarchical scheduling framework based on compositional analysis using uppaal," The 10th International Symposium on Formal Aspects of Component Software. 2013.
- Locke, C. Douglass, et al., Generic avionics software specification. No. CMU/SEI-90-TR-8. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 1990.
- D. Chaum, "Blind Signatures for Untraceable Pay-ments," Advanvances in Cryptology-Proceeding of Crypto'82, Springer-Verlag, pp. 199-204, 1982.