Search
Results
-
DOL-BIP-Critical: A Tool Chain for Rigorous Design and Implementation of Mixed-Criticality Multi-Core Systems
(2016)TIK ReportMixed-criticality systems are promoted in industry due to their potential to reduce size, weight, power, and cost. Nonetheless, deploying mixedcriticality applications on commercial multi-core platforms remains a highly challenging problem. To name a few reasons: (i) Industrial mixed-criticality applications are usually complex reactive applications, which cannot be specified by traditional, e.g., dataflow-based, models of computation. ...Report -
Run and Be Safe: Mixed-Criticality Scheduling with Temporary Processor Speedup
(2014)TIK ReportMixed-Criticality systems are arising due to the push from several major industries including avionics and automotive, where functionalities with different safety criticality levels are integrated into a modern computing platform to reduce size, weight and energy. The state-of-the-art research has focused on protecting critical tasks under the threat of task overrun, which is achieved by killing less critical tasks or degrading their ...Report -
Energy Efficient DVFS Scheduling for Mixed-Criticality Systems
(2014)TIK ReportConsolidating functionalities with different safety requirements into a common platform gives rise to mixed-criticality systems. The state-of-the-art research has focused on providing heterogeneous timing guarantees for tasks of varying criticality levels. This is achieved by dropping less critical tasks when critical tasks overrun. However, with drastically increased computing requirements and the often batteryoperated nature of ...Report -
Service Adaptions for Mixed-Criticality Systems
(2013)TIK ReportComplex embedded systems are typically mixed-critical, where heterogeneous guarantees must be provided for functionalities of different criticalities. We study in this paper the reconfiguration of services provided to low criticality tasks in reaction to the overruns of high criticality tasks. We further investigate the quantification of the resetting time of the system services. For both service reconfiguration and resetting, we derive ...Report -
Derivation of access request arrival curves for dedicated superblock sequences
(2012)TIK ReportThis document is intended to complement the work presented in [4]. In particular, it provides a more elaborate documentation of the method used for the derivation of arrival curves which bound the access request streams of periodically executed dedicated superblocks (Sec. 4.2.1, [4]). Additionally, it presents several abstractions that have been applied to the timed automata-based modelling of a resourcesharing multicore system in order ...Report