Abstract
As shown in Fig. 3.1, the hardware and software configurations, as specified with the previously described Specification PEARL language, are merged into an architecture specification . Together with the application tasks, as designed with the before mentioned TSTD diagrams, they form the system model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Gumzej, R. (2016). Specification PEARL Methodology. In: Engineering Safe and Secure Cyber-Physical Systems. Studies in Computational Intelligence, vol 632. Springer, Cham. https://doi.org/10.1007/978-3-319-28905-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-28905-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28903-8
Online ISBN: 978-3-319-28905-2
eBook Packages: EngineeringEngineering (R0)