Weaklyhard. jl: Scalable analysis of weakly-hard constraints
Weakly-hard models have been used to analyse real-time systems subject to patterns of
deadline hits and misses. However, the tools that are available in the literature have a set of …
deadline hits and misses. However, the tools that are available in the literature have a set of …
[HTML][HTML] On ℓ2-performance of weakly-hard real-time control systems
M Seidel, S Lang, F Allgöwer - European Journal of Control, 2024 - Elsevier
This paper considers control systems with failures in the feedback channel, that occasionally
lead to loss of the control input signal. A useful approach for modeling such failures is to …
lead to loss of the control input signal. A useful approach for modeling such failures is to …
[PDF][PDF] An empirical study of performance interference: Timing violation patterns and impacts
Multi-core platforms are becoming increasingly prevalent in cyber-physical systems such as
automobiles and robots. However, contention for shared resources makes it challenging to …
automobiles and robots. However, contention for shared resources makes it challenging to …
ROTEC: Robust to early termination command governor for systems with limited computing capacity
Abstract A Command Governor (CG) is an optimization-based add-on scheme to a nominal
closed-loop system. It is used to enforce state and control constraints by modifying reference …
closed-loop system. It is used to enforce state and control constraints by modifying reference …
Deadline-miss-adaptive controller implementation for real-time control systems
The policy used to implement a control algorithm in a real-time system can significantly affect
the quality of control. In this paper, we present a method to adapt the controller …
the quality of control. In this paper, we present a method to adapt the controller …
Stochastic Analysis of Control Systems Subject to Communication and Computation Faults
Control theory allows one to design controllers that are robust to external disturbances,
model simplification, and modelling inaccuracy. Researchers have investigated whether the …
model simplification, and modelling inaccuracy. Researchers have investigated whether the …
Characterizing the effect of deadline misses on time-triggered task chains
P Pazzaglia, M Maggio - IEEE Transactions on Computer-Aided …, 2022 - ieeexplore.ieee.org
Modern embedded software includes complex functionalities and routines, often
implemented by splitting the code across different tasks. Such tasks communicate their …
implemented by splitting the code across different tasks. Such tasks communicate their …
The 6g computing continuum (6gcc): Meeting the 6g computing challenges
6G systems, such as Large Intelligent Surfaces, will require distributed, complex, and
coordinated decisions through-out a very heterogeneous and cell free infrastructure. This …
coordinated decisions through-out a very heterogeneous and cell free infrastructure. This …
[PDF][PDF] Consensual Resilient Control: Stateless Recovery of Stateful Controllers
A Matovic, R Graczyk, F Lucchetti… - … Euromicro Conference on …, 2023 - drops.dagstuhl.de
Safety-critical systems have to absorb accidental and malicious faults to obtain high mean-
times-to-failures (MTTFs). Traditionally, this is achieved through re-execution or replication …
times-to-failures (MTTFs). Traditionally, this is achieved through re-execution or replication …
Response-time analysis and optimization for probabilistic conditional parallel DAG tasks
Cyber-physical systems (CPS) increasingly use multicore processors in order to satisfy
power and computational requirements. To exploit the architectural parallelism offered by …
power and computational requirements. To exploit the architectural parallelism offered by …