Basics of Invasive Computing (A01)

Albeit the isolation of parallel programs on multicore systems through invasive computing, uncertainties of input, machine state and environment currently prohibit to provide predictable and tight bounds on non-functional properties such as timing and power and to guarantee that requirements on these will never be violated. We will investigate novel concepts and techniques for run-time requirement enforcement (RRE) including (a) centralised vs. distributed, (b) loose vs. strict, (c) proper formal verification techniques for strict enforcers and general pro-gram properties, finally (d) techniques for automatic enforcer generation from requirements.