Timed and Resource-oriented Statecharts for embedded software

Jinhyun Kim, Inhye Kang, Jin Young Choi, Insup Lee

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)


Embedded software should be correctly developed so that it is be compliant with not only functional requirements but also real-time and resource constraints. However, those constraints are often dependent on execution environments that are sometimes revealed in late development phases. In this paper, we propose Timed and Resource-oriented Statecharts (TRoS) to analyze the time and resource-constrained behavior of system in earlier development phases of embedded software development. TRoS extends Statecharts using timed action labeled with resources to represent actions that consume resources. This enables us to describe the competition among processes to use shared resources, and to analyze schedulability of embedded systems. We present a case study of a distance control module that controls train movement to keep the distance between trains for railway control systems.

Original languageEnglish
Article number5546925
Pages (from-to)568-578
Number of pages11
JournalIEEE Transactions on Industrial Informatics
Issue number4
Publication statusPublished - 2010 Nov

Bibliographical note

Funding Information:
Manuscript received November 06, 2009; revised April 01, 2010; accepted June 17, 2010. Date of publication August 12, 2010; date of current version November 05, 2010. This work was supported in part by NIPA under the program of Software Engineering Technologies Development, by KOSEF R11-2008-007-03002-0, and by NSF CNS-093239 and NSF CNS 0834524. Paper no. TII-09-11-0316.


  • Embedded software
  • formal methods
  • platformbased development
  • process algebra
  • statecharts

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Timed and Resource-oriented Statecharts for embedded software'. Together they form a unique fingerprint.

Cite this