EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Mixed criticality Real time Task Scheduling with Graceful Degradation

Download or read book Mixed criticality Real time Task Scheduling with Graceful Degradation written by Samsil Arefin and published by . This book was released on 2018 with total page 66 pages. Available in PDF, EPUB and Kindle. Book excerpt: "The mixed-criticality real-time systems implement functionalities of different degrees of importance (or criticalities) upon a shared platform. In traditional mixed-criticality systems, under a hi mode switch, no guaranteed service is provided to lo-criticality tasks. After a mode switch, only hi-criticality tasks are considered for execution while no guarantee is made to the lo-criticality tasks. However, with careful optimistic design, a certain degree of service guarantee can be provided to lo-criticality tasks upon a mode switch. This concept is broadly known as graceful degradation. Guaranteed graceful degradation provides a better quality of service as well as it utilizes the system resource more efficiently. In this thesis, we study two efficient techniques of graceful degradation. First, we study a mixed-criticality scheduling technique where graceful degradation is provided in the form of minimum cumulative completion rates. We present two easy-to-implement admission-control algorithms to determine which lo-criticality jobs to complete in hi mode. The scheduling is done by following deadline virtualization, and two heuristics are shown for virtual deadline settings. We further study the schedulability analysis and the backward mode switch conditions, which are proposed and proved in (Guo et al., 2018). Next, we present a probabilistic scheduling technique for mixed-criticality tasks on multiprocessor systems where a system-wide permitted failure probability is known. The schedulability conditions are derived along with the processor allocation scheme. The work is extended from (Guo et al., 2015), where the probabilistic model is first introduced for independent task scheduling on a uniprocessor platform. We further consider the failure dependency between tasks while scheduling on multiprocessor platforms. We provide related theoretical analysis to show the correctness of our work. To show the effectiveness of our proposed techniques, we conduct a detailed experimental evaluation under different circumstances"--Abstract, page iii.

Book Scheduling in Real time Systems to Ensure Graceful Degradation

Download or read book Scheduling in Real time Systems to Ensure Graceful Degradation written by Wei-Kuan Shih and published by . This book was released on 1992 with total page 298 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Quality of Service Aware Design and Management of Embedded Mixed Criticality Systems

Download or read book Quality of Service Aware Design and Management of Embedded Mixed Criticality Systems written by Behnaz Ranjbar and published by Springer Nature. This book was released on 2023-10-28 with total page 205 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book addresses the challenges associated with efficient Mixed-Criticality (MC) system design. We focus on application analysis through execution time analysis and task scheduling analysis in order to execute more low-criticality tasks in the system, i.e., improving the Quality-of-Service (QoS), while guaranteeing the correct execution of high-criticality tasks. Further, this book addresses the challenge of enhancing QoS using parallelism in multi-processor hardware platforms.

Book Handbook of Real Time Computing

Download or read book Handbook of Real Time Computing written by Yu-Chu Tian and published by Springer Nature. This book was released on 2022-08-08 with total page 1511 pages. Available in PDF, EPUB and Kindle. Book excerpt: The aim of this handbook is to summarize the recent rapidly developed real-time computing technologies, from theories to applications. This handbook benefits the readers as a full and quick technical reference with a high-level historic review of technology, detailed technical descriptions and the latest practical applications. In general, the handbook is divided into three main parts (subjected to be modified): theory, design, and application covering different but not limited to the following topics: - Real-time operating systems - Real-time scheduling - Timing analysis - Programming languages and run-time systems - Middleware systems - Design and analysis tools - Real-time aspects of wireless sensor networks - Energy aware real-time methods

Book Machine Learning and Optimization Techniques for Automotive Cyber Physical Systems

Download or read book Machine Learning and Optimization Techniques for Automotive Cyber Physical Systems written by Vipin Kumar Kukkala and published by Springer Nature. This book was released on 2023-10-03 with total page 782 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides comprehensive coverage of various solutions that address issues related to real-time performance, security, and robustness in emerging automotive platforms. The authors discuss recent advances towards the goal of enabling reliable, secure, and robust, time-critical automotive cyber-physical systems, using advanced optimization and machine learning techniques. The focus is on presenting state-of-the-art solutions to various challenges including real-time data scheduling, secure communication within and outside the vehicle, tolerance to faults, optimizing the use of resource-constrained automotive ECUs, intrusion detection, and developing robust perception and control techniques for increasingly autonomous vehicles.

Book Approximate Computing Techniques

Download or read book Approximate Computing Techniques written by Alberto Bosio and published by Springer Nature. This book was released on 2022-06-10 with total page 541 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book serves as a single-source reference to the latest advances in Approximate Computing (AxC), a promising technique for increasing performance or reducing the cost and power consumption of a computing system. The authors discuss the different AxC design and validation techniques, and their integration. They also describe real AxC applications, spanning from mobile to high performance computing and also safety-critical applications.

Book Scheduling of Certifiable Mixed criticality Systems

Download or read book Scheduling of Certifiable Mixed criticality Systems written by Dario Socci and published by . This book was released on 2016 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Modern real-time systems tend to be mixed-critical, in the sense that they integrate on the same computational platform applications at different levels of criticality. Integration gives the advantages of reduced cost, weight and power consumption, which can be crucial for modern applications like Unmanned Aerial Vehicles (UAVs). On the other hand, this leads to major complications in system design. Moreover, such systems are subject to certification, and different criticality levels needs to be certified at different level of assurance. Among other aspects, the real-time scheduling of certifiable mixed critical systems has been recognized to be a challenging problem. Traditional techniques require complete isolation between criticality levels or global certification to the highest level of assurance, which leads to resource waste, thus loosing the advantage of integration. This led to a novel wave of research in the real-time community, and many solutions were proposed. Among those, one of the most popular methods used to schedule such systems is Audsley approach. However this method has some limitations, which we discuss in this thesis. These limitations are more pronounced in the case of multiprocessor scheduling. In this case priority-based scheduling looses some important properties. For this reason scheduling algorithms for multiprocessor mixed-critical systems are not as numerous in literature as the single processor ones, and usually are built on restrictive assumptions. This is particularly problematic since industrial real-time systems strive to migrate from single-core to multi-core and many-core platforms. Therefore we motivate and study a different approach that can overcome these problems.A restriction of practical usability of many mixed-critical and multiprocessor scheduling algorithms is assumption that jobs are independent. In reality they often have precedence constraints. In the thesis we show the mixed-critical variant of the problem formulation and extend the system load metrics to the case of precedence-constraint task graphs. We also show that our proposed methodology and scheduling algorithm MCPI can be extended to the case of dependent jobs without major modification and showing similar performance with respect to the independent jobs case. Another topic we treated in this thesis is time-triggered scheduling. This class of schedulers is important because they considerably reduce the uncertainty of job execution intervals thus simplifying the safety-critical system certification. They also simplify any auxiliary timing-based analyses that may be required to validate important extra-functional properties in embedded systems, such as interference on shared buses and caches, peak power dissipation, electromagnetic interference etc..The trivial method of obtaining a time-triggered schedule is simulation of the worst-case scenario in event-triggered algorithm. However, when applied directly, this method is not efficient for mixed-critical systems, as instead of one worst-case scenario they have multiple corner-case scenarios. For this reason, it was proposed in the literature to treat all scenarios into just a few tables, one per criticality mode. We call this scheduling approach Single Time Table per Mode (STTM) and propose a contribution in this context. In fact we introduce a method that transforms practically any scheduling algorithm into an STTM one. It works optimally on single core and shows good experimental results for multi-cores.Finally we studied the problem of the practical realization of mixed critical systems. Our effort in this direction is a design flow that we propose for multicore mixed critical systems. In this design flow, as the model of computation we propose a network of deterministic multi-periodic synchronous processes. Our approach is demonstrated using a publicly available toolset, an industrial application use case and a multi-core platform.

Book The Application of Formal Methods

Download or read book The Application of Formal Methods written by Simon Foster and published by Springer Nature. This book was released on with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book An Elastic Mixed criticality Scheduling Framework for Cyber physical Systems

Download or read book An Elastic Mixed criticality Scheduling Framework for Cyber physical Systems written by Hang Su and published by . This book was released on 2015 with total page 122 pages. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, the rapid growth of cyber-physical systems (CPS) attracts the research interests from both industrial and academic communities. With increasing needs of executing tasks with multiple-critical levels on a shared computing system, scheduling mixed-criticality tasks while satisfying their specific requirements has been identified as one of the most fundamental issues in CPS. Most existing mixed-criticality scheduling algorithms guarantee higher level worst-case execution times (WCETs) of high-critical tasks at the expense of discarding low-critical tasks, which can cause control system to suffer from significant performance loss. To provide minimal service guarantee for low-critical tasks and stabilize real-time control system, an Elastic Mixed-Criticality (E-MC) task model and the associated early-release EDF (ER-EDF) scheduling algorithm are proposed. In ER-EDF, low-critical tasks are allowed to be released at least once during their maximum periods (i.e., minimal service level) while ensuring the worst-case timing constraints of high-critical tasks are always met. During run-time, slack time generated from high-critical tasks can allow LC tasks to release more frequently, which improves their control performance. The ER-EDF are studied on single and multi-core system. Observing the overheads associated with run-time slack management for early-releases, the E-MC model is extended to allow each low-critical task have a pair of small and large periods, which represent its service guarantees in low and high running modes, respectively. The dynamic-priority (DP) and fixed-priority (FP) scheduling algorithms are proposed for the extended E-MC model (E-MC 2 ), where their schedulabilities are analyzed with demand-bound function (DBF) and WCET response time analysis (RTA) techniques, respectively. In addition, period selection and priority assignment are also investigated for optimizing control performance of real-time CPS.

Book Scheduling in Real time Systems to Ensure Graceful Degradation  the Imprecise  computation and the Deferred deadline Approches

Download or read book Scheduling in Real time Systems to Ensure Graceful Degradation the Imprecise computation and the Deferred deadline Approches written by W.-K. Shih and published by . This book was released on 1992 with total page 132 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Dependable and Historic Computing

Download or read book Dependable and Historic Computing written by Cliff B. Jones and published by Springer. This book was released on 2012-01-24 with total page 531 pages. Available in PDF, EPUB and Kindle. Book excerpt: This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell’s work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell’s love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.

Book Schedulability in Mixed criticality Systems

Download or read book Schedulability in Mixed criticality Systems written by Rany Kahil and published by . This book was released on 2019 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Real-time safety-critical systems must complete their tasks within a given time limit. Failure to successfully perform their operations, or missing a deadline, can have severe consequences such as destruction of property and/or loss of life. Examples of such systems include automotive systems, drones and avionics among others. Safety guarantees must be provided before these systems can be deemed usable. This is usually done through certification performed by a certification authority.Safety evaluation and certification are complicated and costly even for smaller systems.One answer to these difficulties is the isolation of the critical functionality. Executing tasks of different criticalities on separate platforms prevents non-critical tasks from interfering with critical ones, provides a higher guaranty of safety and simplifies the certification process limiting it to only the critical functions. But this separation, in turn, introduces undesirable results portrayed by an inefficient resource utilization, an increase in the cost, weight, size and energy consumption which can put a system in a competitive disadvantage.To overcome the drawbacks of isolation, Mixed Criticality (MC) systems can be used. These systems allow functionalities with different criticalities to execute on the same platform. In 2007, Vestal proposed a model to represent MC-systems where tasks have multiple Worst Case Execution Times (WCETs), one for each criticality level. In addition, correctness conditions for scheduling policies were formally defined, allowing lower criticality jobs to miss deadlines or be even dropped in cases of failure or emergency situations.The introduction of multiple WCETs and different conditions for correctness increased the difficulty of the scheduling problem for MC-systems. Conventional scheduling policies and schedulability tests proved inadequate and the need for new algorithms arose. Since then, a lot of work has been done in this field.In this thesis, we contribute to the study of schedulability in MC-systems. The workload of a system is represented as a set of jobs that can describe the execution over the hyper-period of tasks or over a duration in time. This model allows us to study the viability of simulation-based correctness tests in MC-systems. We show that simulation tests can still be used in mixed-criticality systems, but in this case, the schedulability of the worst case scenario is no longer sufficient to guarantee the schedulability of the system even for the fixed priority scheduling case. We show that scheduling policies are not predictable in general, and define the concept of weak-predictability for MC-systems. We prove that a specific class of fixed priority policies are weakly predictable and propose two simulation-based correctness tests that work for weakly-predictable policies.We also demonstrate that contrary to what was believed, testing for correctness can not be done only through a linear number of preemptions.The majority of the related work focuses on systems of two criticality levels due to the difficulty of the problem. But for automotive and airborne systems, industrial standards define four or five criticality levels, which motivated us to propose a scheduling algorithm that schedules mixed-criticality systems with theoretically any number of criticality levels. We show experimentally that it has higher success rates compared to the state of the art.We illustrate how our scheduling algorithm, or any algorithm that generates a single time-triggered table for each criticality mode, can be used as a recovery strategy to ensure the safety of the system in case of certain failures.Finally, we propose a high level concurrency language and a model for designing an MC-system with coarse grained multi-core interference.

Book Resource efficient Scheduling of Multiprocessor Mixed criticality Real time Systems

Download or read book Resource efficient Scheduling of Multiprocessor Mixed criticality Real time Systems written by Jaewoo Lee and published by . This book was released on 2017 with total page 214 pages. Available in PDF, EPUB and Kindle. Book excerpt: Timing guarantee is critical to ensure the correctness of embedded software systems that interact with the physical environment. As modern embedded real-time systems evolves, they face three challenges: resource constraints, mixed-criticality, and multiprocessors. This dissertation focuses on resource-efficient scheduling techniques for mixed-criticality systems on multiprocessor platforms.While Mixed-Criticality (MC) scheduling has been extensively studied on uniprocessor platforms, the problem on multiprocessor platforms has been largely open. Multiprocessor algorithms are broadly classified into two categories: global and partitioned. Global scheduling approaches use a global run-queue and migrate tasks among processors for improved schedulability. Partitioned scheduling approaches use per processor run-queues and can reduce preemption/migration overheads in real implementation. Existing global scheduling schemes for MC systems have suffered from low schedulability. Our goal in the first work is to improve the schedulability of MC scheduling algorithms. Inspired by the fluid scheduling model in a regular (non-MC) domain, we have developed the MC-Fluid scheduling algorithm that executes a task with criticality-dependent rates. We have evaluated MC-Fluid in terms of the processor speedup factor: MC-Fluid is a multiprocessor MC scheduling algorithm with a speed factor of 4/3, which is known to be optimal. In other words, MC-Fluid can schedule any feasible mixed-criticality task system if each processor is sped up by a factor of 4/3. Although MC-Fluid is speedup-optimal, it is not directly implementable on multiprocessor platforms of real processors due to the fractional processor assumption where multiple task can be executed on one processor at the same time. In the second work, we have considered the characteristic of a real processor (executing only one task at a time) and have developed the MC-Discrete scheduling algorithm for regular (non-fluid) scheduling platforms. We have shown that MC-Discrete is also speedup-optimal. While our previous two works consider global scheduling approaches, our last work considers partitioned scheduling approaches, which are widely used in practice because of low implementation overheads. In addition to partitioned scheduling, the work considers the limitation of conventional MC scheduling algorithms that drops all low-criticality tasks when violating a certain threshold of actual execution times. In practice, the system designer wants to execute the tasks as much as possible. To address the issue, we have developed the MC-ADAPT scheduling framework under uniprocessor platforms to drop as few low-criticality tasks as possible. Extending the framework with partitioned multiprocessor platforms, we further reduce the dropping of low-criticality tasks by allowing migration of low-criticality tasks at the moment of a criticality switch. We have evaluated the quality of task dropping solution in terms of speedup factor. In existing work, the speedup factor has been used to evaluate MC scheduling algorithms in terms of schedulability under the worst-case scheduling scenario. In this work, we apply the speedup factor to evaluate MC scheduling algorithms in terms of the quality of their task dropping solution under various MC scheduling scenarios. We have derived that MC-ADAPT has a speedup factor of 1.618 for task dropping solution.

Book Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing  Theory and Applications  FICTA  2014

Download or read book Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing Theory and Applications FICTA 2014 written by Suresh Chandra Satapathy and published by Springer. This book was released on 2014-10-17 with total page 838 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume contains 95 papers presented at FICTA 2014: Third International Conference on Frontiers in Intelligent Computing: Theory and Applications. The conference was held during 14-15, November, 2014 at Bhubaneswar, Odisha, India. This volume contains papers mainly focused on Data Warehousing and Mining, Machine Learning, Mobile and Ubiquitous Computing, AI, E-commerce & Distributed Computing and Soft Computing, Evolutionary Computing, Bio-inspired Computing and its Applications.

Book Verification and Evaluation of Computer and Communication Systems

Download or read book Verification and Evaluation of Computer and Communication Systems written by Pierre Ganty and published by Springer Nature. This book was released on 2019-11-12 with total page 111 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 13th International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2019), held in Porto, Portugal, in October 2019. The 7 full papers in this volume, presented together with two invited talks, were carefully reviewed and selected from 13 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance, and dependability evaluation in order to discuss state of the art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems.

Book Fault Tolerant Real Time Scheduling for Multiprocessor Systems

Download or read book Fault Tolerant Real Time Scheduling for Multiprocessor Systems written by Rakesh K Bansal and published by LAP Lambert Academic Publishing. This book was released on 2011-01 with total page 180 pages. Available in PDF, EPUB and Kindle. Book excerpt: Owing to advances in VLSI and other related technologies, real-time systems have come to an age where their presence is being felt in almost every facet of human life.There is a steady rising trend in the fraction of all processors, manufactured worldwide, that find their way to real-time applications. Most of these time and mission critical applications demand reliable processing environment to guarantee error free execution and completion within the respective time deadlines. Scheduling algorithms can provide low-cost solutions to fault-tolerance and graceful performance degradation by exploiting tradeoffs between space or time redundancy, timing accuracy, and quality of service. The intricacies of Primary- Backup fault-tolerance approach that works fine for independent task scheduling are explored for DAG structured applications through examples. This work contributes toward understanding and analyzing fault-tolerance issue for precedence-constrained real-time applications, on homogeneous and heterogeneous multiprocessing platforms, and developing a new 100% 1-fault-tolerant algorithm in this much desirable and critical research area.