{"id":"https://openalex.org/W2136812185","doi":"https://doi.org/10.1109/aiccsa.2008.4493674","title":"Development guidelines for dependable real-time embedded systems","display_name":"Development guidelines for dependable real-time embedded systems","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2136812185","doi":"https://doi.org/10.1109/aiccsa.2008.4493674","mag":"2136812185"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2008.4493674","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2008.4493674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Development_Guidelines_for_Dependable_Real-Time_Embedded_Systems_/10083272","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016807947","display_name":"Michael Short","orcid":"https://orcid.org/0000-0001-6290-4396"},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Michael Short","raw_affiliation_strings":["Embedded Systems Laboratory, University of Leicester, Leicester, UK","University of Leicester , Leicester"],"affiliations":[{"raw_affiliation_string":"Embedded Systems Laboratory, University of Leicester, Leicester, UK","institution_ids":["https://openalex.org/I153648349"]},{"raw_affiliation_string":"University of Leicester , Leicester","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5016807947"],"corresponding_institution_ids":["https://openalex.org/I153648349"],"apc_list":null,"apc_paid":null,"fwci":1.3814,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.84377125,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1032","last_page":"1039"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7977027297019958},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5485414862632751},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.513009250164032},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.5077656507492065},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5010859966278076},{"id":"https://openalex.org/keywords/multiprocessing","display_name":"Multiprocessing","score":0.4645020663738251},{"id":"https://openalex.org/keywords/embedded-software","display_name":"Embedded software","score":0.4616606831550598},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4141385555267334},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.412834107875824},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3981861174106598},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.29830288887023926},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18832546472549438},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16382941603660583},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11801391839981079}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7977027297019958},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5485414862632751},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.513009250164032},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5077656507492065},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5010859966278076},{"id":"https://openalex.org/C4822641","wikidata":"https://www.wikidata.org/wiki/Q846651","display_name":"Multiprocessing","level":2,"score":0.4645020663738251},{"id":"https://openalex.org/C154488198","wikidata":"https://www.wikidata.org/wiki/Q1335007","display_name":"Embedded software","level":3,"score":0.4616606831550598},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4141385555267334},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.412834107875824},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3981861174106598},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29830288887023926},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18832546472549438},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16382941603660583},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11801391839981079},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/aiccsa.2008.4493674","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2008.4493674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","raw_type":"proceedings-article"},{"id":"pmh:oai:figshare.com:article/10083272","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Development_Guidelines_for_Dependable_Real-Time_Embedded_Systems_/10083272","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:openaire_cris_publications/12169e2a-ef60-4fcb-81d8-21d46b93bcd0","is_oa":false,"landing_page_url":"https://research.tees.ac.uk/en/publications/12169e2a-ef60-4fcb-81d8-21d46b93bcd0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Short, M 2008, Development guidelines for dependable real-time embedded systems. in AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications., 4493674, AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications, pp. 1032-1039, 6th IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar, 31/03/08. https://doi.org/10.1109/AICCSA.2008.4493674","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:publications/12169e2a-ef60-4fcb-81d8-21d46b93bcd0","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=50049091479&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Short, M 2008, Development guidelines for dependable real-time embedded systems. in AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications., 4493674, AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications, pp. 1032-1039, 6th IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar, 31/03/08. https://doi.org/10.1109/AICCSA.2008.4493674","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:lra.le.ac.uk:2381/4190","is_oa":false,"landing_page_url":"http://hdl.handle.net/2381/4190","pdf_url":null,"source":{"id":"https://openalex.org/S4306402365","display_name":"Leicester Research Archive (University of Leicester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I153648349","host_organization_name":"University of Leicester","host_organization_lineage":["https://openalex.org/I153648349"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/10083272","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Development_Guidelines_for_Dependable_Real-Time_Embedded_Systems_/10083272","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W48386137","https://openalex.org/W132594803","https://openalex.org/W159136752","https://openalex.org/W1570153265","https://openalex.org/W1583869287","https://openalex.org/W1919158403","https://openalex.org/W2014305198","https://openalex.org/W2035117740","https://openalex.org/W2042465236","https://openalex.org/W2049384405","https://openalex.org/W2097331548","https://openalex.org/W2101855829","https://openalex.org/W2102041064","https://openalex.org/W2109866263","https://openalex.org/W2112696369","https://openalex.org/W2115179079","https://openalex.org/W2119599601","https://openalex.org/W2129538349","https://openalex.org/W2130181800","https://openalex.org/W2137784941","https://openalex.org/W2147886401","https://openalex.org/W2147904999","https://openalex.org/W2336850053","https://openalex.org/W2401003083","https://openalex.org/W2575786277","https://openalex.org/W6675361099","https://openalex.org/W6676218710"],"related_works":["https://openalex.org/W1643644608","https://openalex.org/W2062007833","https://openalex.org/W2112394415","https://openalex.org/W2035203411","https://openalex.org/W1967767358","https://openalex.org/W1973798274","https://openalex.org/W2142699588","https://openalex.org/W2168420486","https://openalex.org/W2358359171","https://openalex.org/W1593480824"],"abstract_inverted_index":{"Embedded":[0],"control":[1],"systems":[2,20,63,78,89],"play":[3],"an":[4],"increasing":[5],"role":[6],"in":[7,113,139],"many":[8,23,131],"safety":[9],"critical":[10],"system":[11,29],"designs.":[12],"The":[13],"correct":[14],"and":[15,32,41,46,111,127,135],"dependable":[16,61,87,143],"implementation":[17],"of":[18,28,38,55,60,86,96,108,125,132,142],"such":[19,98],"depends":[21],"on":[22,93],"factors,":[24],"including":[25],"the":[26,36,43,58,67,84,94,133,140],"design":[27],"hardware,":[30],"software":[31],"fault":[33],"tolerance":[34],"mechanisms,":[35],"choice":[37],"programming":[39],"language,":[40],"also":[42],"testing,":[44],"verification":[45],"validation":[47],"techniques":[48],"employed.":[49],"In":[50],"this":[51],"paper,":[52],"a":[53,120],"set":[54,124],"guidelines":[56,128],"for":[57],"development":[59,112],"embedded":[62,88,144],"is":[64,69],"presented.":[65],"Although":[66,83],"paper":[68],"primarily":[70],"concerned":[71],"with":[72],"single-processor":[73],"applications,":[74],"extensions":[75],"to":[76,119],"multiprocessor":[77],"are":[79],"discussed":[80],"where":[81],"appropriate.":[82],"creation":[85,141],"cannot":[90],"simply":[91],"rely":[92],"enforcement":[95],"several":[97,105],"rules":[99,126],"or":[100],"guidelines,":[101],"experience":[102,107],"gained":[103],"from":[104],"years'":[106],"teaching,":[109],"research":[110],"these":[114],"areas":[115],"indicates":[116],"that":[117],"adherence":[118],"small,":[121],"but":[122],"workable,":[123],"can":[129],"avoid":[130],"traps":[134],"pitfalls":[136],"commonly":[137],"encountered":[138],"systems.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
