{"id":1075,"date":"2023-03-10T17:50:50","date_gmt":"2023-03-10T17:50:50","guid":{"rendered":"https:\/\/www.ecrts.org\/?page_id=1075"},"modified":"2023-03-10T17:50:50","modified_gmt":"2023-03-10T17:50:50","slug":"industrial-challenge-previous-challenges","status":"publish","type":"page","link":"https:\/\/www.ecrts.org\/industrial-challenge-previous-challenges\/","title":{"rendered":"Industrial Challenge – Previous Challenges"},"content":{"rendered":"\n

Bosch – Real World Automotive Software Benchmarks<\/h2>\n\n\n\n
\"\"<\/figure>\n\n\n\n

Abstract<\/strong>: The challenge consists in providing concepts for realizing implicit and LET communication, then assessing their impact on the end-to-end latency along a set of given cause-effect chains in a full blown engine management software using the Amalthea performance model.<\/p>\n\n\n\n

The Bosch industrial challenge was proposed by Arne Hamann, Simon Kramer, Martin Lukasiewycz, Michael Pressler, Dakshina Dasari, Falk Wurst and Dirk Ziegenbein from Bosch GmbH. in WATERS 2016<\/a>, then extended and evolved in WATERS 2017<\/a>, and 2019<\/a>. <\/p>\n\n\n\n

Dassault – Middleware for Drone-Like Cyber-Physical Systems<\/h2>\n\n\n\n
\"\"<\/figure>\n\n\n\n

Abstract<\/strong>: The challenge is based on a small drone-like cyber-physical system and consists in contributing the concepts, models, candidate technologies, and analyses of the proposed use case’s middleware layer. Contributions are expected on timing-contract languages, suitable abstractions of the concrete technological solutions, compositionality and genericity of the correctness arguments.<\/p>\n\n\n\n

See the RESSAC use case, called “\u03bcXAV: A Collaborative Development Assurance Lab”,<\/a> proposed by Emmanuel Ledinot from Dassault Aviation and presented in WATERS 2018 for detailed material and solutions submitted to date.<\/p>\n\n\n\n

Thales – Aerial Video System to Detect and Track a Moving Object<\/h2>\n\n\n\n
\"\"<\/figure>\n\n\n\n

Abstract<\/strong>: The challenge involves a mission critical system used in intelligence, surveillance, reconnaissance, tactical and security applications that is characterized by strict and less strict constraints on timing. The application must<\/p>\n\n\n\n