Weaklyhard. jl: Scalable analysis of weakly-hard constraints

N Vreman, R Pates, M Maggio - 2022 IEEE 28th Real-Time and …, 2022 - ieeexplore.ieee.org
Weakly-hard models have been used to analyse real-time systems subject to patterns of
deadline hits and misses. However, the tools that are available in the literature have a set of …

[HTML][HTML] On ℓ2-performance of weakly-hard real-time control systems

M Seidel, S Lang, F Allgöwer - European Journal of Control, 2024 - Elsevier
This paper considers control systems with failures in the feedback channel, that occasionally
lead to loss of the control input signal. A useful approach for modeling such failures is to …

[PDF][PDF] An empirical study of performance interference: Timing violation patterns and impacts

A Li, J Wang, S Baruah… - Proceedings of the …, 2024 - cybersecurity.seas.wustl.edu
Multi-core platforms are becoming increasingly prevalent in cyber-physical systems such as
automobiles and robots. However, contention for shared resources makes it challenging to …

ROTEC: Robust to early termination command governor for systems with limited computing capacity

M Hosseinzadeh, B Sinopoli, I Kolmanovsky… - Systems & Control …, 2022 - Elsevier
Abstract A Command Governor (CG) is an optimization-based add-on scheme to a nominal
closed-loop system. It is used to enforce state and control constraints by modifying reference …

Deadline-miss-adaptive controller implementation for real-time control systems

N Vreman, C Mandrioli, A Cervin - 2022 IEEE 28th Real-Time …, 2022 - ieeexplore.ieee.org
The policy used to implement a control algorithm in a real-time system can significantly affect
the quality of control. In this paper, we present a method to adapt the controller …

Stochastic Analysis of Control Systems Subject to Communication and Computation Faults

N Vreman, M Maggio - ACM Transactions on Embedded Computing …, 2023 - dl.acm.org
Control theory allows one to design controllers that are robust to external disturbances,
model simplification, and modelling inaccuracy. Researchers have investigated whether the …

Characterizing the effect of deadline misses on time-triggered task chains

P Pazzaglia, M Maggio - IEEE Transactions on Computer-Aided …, 2022 - ieeexplore.ieee.org
Modern embedded software includes complex functionalities and routines, often
implemented by splitting the code across different tasks. Such tasks communicate their …

The 6g computing continuum (6gcc): Meeting the 6g computing challenges

W Tärneberg, E Fitzgerald, M Bhuyan… - … Conference on 6G …, 2022 - ieeexplore.ieee.org
6G systems, such as Large Intelligent Surfaces, will require distributed, complex, and
coordinated decisions through-out a very heterogeneous and cell free infrastructure. This …

[PDF][PDF] Consensual Resilient Control: Stateless Recovery of Stateful Controllers

A Matovic, R Graczyk, F Lucchetti… - … Euromicro Conference on …, 2023 - drops.dagstuhl.de
Safety-critical systems have to absorb accidental and malicious faults to obtain high mean-
times-to-failures (MTTFs). Traditionally, this is achieved through re-execution or replication …

Response-time analysis and optimization for probabilistic conditional parallel DAG tasks

N Ueter, M Günzel, JJ Chen - 2021 IEEE Real-Time Systems …, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) increasingly use multicore processors in order to satisfy
power and computational requirements. To exploit the architectural parallelism offered by …