In a real-time constrained network, some of the applications coexisting in the network require temporal guarantees to have a behavior compliant with their specifications (e.g. voice over IP, control-command applications, multimedia applications, distributed interactive games). To be certified as secure, a hard real-time network such as in nuclear power plants or on board airplanes have to verify several properties, especially the following: In normal functioning, every transmitted packet reaches the right destination in a bounded time. To provide deterministic guarantees on these times, a formal method (called the trajectory approach) has been proposed. This is based on the scheduling theory and provides accurate bounds computed mathematically.
Equipes
Réseaux & Optimisation Combinatoire et Stochastique
Equipes-projets Inria communes
Resultats majeurs
Contrats
CIFRE 998/2009
Logiciels et brevets
Collaborations
Membres
MARTIN Steven
Thèses et habilitations