About 120,000 results
Open links in new tab
  1. Functional Safety Mechanisms: This chapter contains AUTOSAR functional safety mechanisms related to freedom from interference between AUTOSAR SW-Cs. Memory: Partitioning …

  2. Logical monitoring of program sequence - Stack Overflow

    May 31, 2024 · Following ISO/IEC 61508 functional safety standard (or ISO 26262), logical monitoring of program sequence is a suggested diagnostic method, to verify an application …

  3. Functional Safety Mechanism in AUTOSAR - LinkedIn

    Jan 19, 2022 · The Watchdog Manager provides three mechanisms for Temporal and Logical Program Flow Monitoring: Deadline Supervision, Alive Supervision and Logical Supervision. …

  4. Aperiodic Supervised Entities have individual constraints on the timing between two Checkpoints. The Watchdog-Manager traces the checkpoints using a checkpoint graph, determining the …

  5. In this paper, we propose two enhanced safety mechanisms for AUTOSAR so that AUTOSAR can detect all types of software faults listed in ISO 26262. We first propose an enhanced deadline …

  6. CN111427723A - Program flow monitoring method based on AutoSAR

    The invention provides a program flow monitoring method and an application device based on an AutoSAR, comprising the following steps: each monitoring software entity sequentially acquires...

  7. Logical monitoring of execution sequence of a program [3, BRF00131] enables the detection of errors that cause a divergence from valid program sequence during the error-free execution of …

  8. Health Monitoring is required by [1, ISO 26262] (under the terms control flow monitoring, external monitoring facility, watchdog, logical monitoring, temporal moni-toring, program sequence …

  9. How to Configure the Watchdog BSW Stack's Supervision

    In this application note you will learn about what types of supervision modes are supported in the watchdog stack of RTA-BSW and how to configure each of these modes. Wdg/WDG: …

  10. sequence and task triggering presents developers with a high degree of complexity which is difficult to secure. An alternative solution is available from TTTech and Vector Informatik. This …

Refresh