首页 > 最新文献

International Journal of Embedded and Real-Time Communication Systems (IJERTCS)最新文献

英文 中文
A generic approach for the certified schedulability analysis of software systems 软件系统可调度性分析的通用方法
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00018
Xiaojie Guo, Lionel Rieg, P. Torrini
Embedded systems often need to react in a timely manner. Life-critical or mission-critical ones require assurance that they comply with these real-time requirements. In particular, schedulability analysis is both essential and difficult to get right. Formal methods can help as they are a powerful tool for ensuring properties with the highest assurance level. We describe a case study for the FPP and EDF policies providing end-to-end assurance by connecting the schedulability analysis tool Prosa and the real-time OS kernel RT-CertiKOS, both using the Coq proof assistant to prove their results. Analyzing precisely the key ideas underlying this connection, we improve it to make it more generic and reduce the associated proof burden. We thus sketch a refined method which allows for providing formal schedulability guarantees to other OSes or low-level components with minimal effort.
嵌入式系统通常需要及时做出反应。生命关键型或任务关键型需要确保它们符合这些实时需求。特别是,可调度性分析既重要又难以正确进行。形式化方法可以提供帮助,因为它们是确保具有最高保证级别的属性的强大工具。我们描述了一个FPP和EDF策略的案例研究,通过连接可调度性分析工具Prosa和实时操作系统内核RT-CertiKOS,提供端到端保证,两者都使用Coq证明助手来证明其结果。我们准确地分析了这种联系背后的关键思想,对其进行了改进,使其更通用,并减少了相关的举证负担。因此,我们概述了一种改进的方法,允许以最小的努力为其他操作系统或低级组件提供正式的可调度性保证。
{"title":"A generic approach for the certified schedulability analysis of software systems","authors":"Xiaojie Guo, Lionel Rieg, P. Torrini","doi":"10.1109/RTCSA52859.2021.00018","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00018","url":null,"abstract":"Embedded systems often need to react in a timely manner. Life-critical or mission-critical ones require assurance that they comply with these real-time requirements. In particular, schedulability analysis is both essential and difficult to get right. Formal methods can help as they are a powerful tool for ensuring properties with the highest assurance level. We describe a case study for the FPP and EDF policies providing end-to-end assurance by connecting the schedulability analysis tool Prosa and the real-time OS kernel RT-CertiKOS, both using the Coq proof assistant to prove their results. Analyzing precisely the key ideas underlying this connection, we improve it to make it more generic and reduce the associated proof burden. We thus sketch a refined method which allows for providing formal schedulability guarantees to other OSes or low-level components with minimal effort.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"52 1","pages":"83-92"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84151525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Exploring Image Resizing for Optimizing Criticality-based Machine Perception 探索基于关键度的机器感知优化图像调整大小
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00027
Yigong Hu, Shengzhong Liu, T. Abdelzaher, Maggie B. Wigness, P. David
On-board computing capacity remains a key bottleneck in modern machine inference pipelines that run on embedded hardware, such as aboard autonomous drones or cars. To mitigate this bottleneck, recent work proposed an architecture for segmenting input frames of complex modalities, such as video, and prioritizing downstream machine perception tasks based on criticality of the respective segments of the perceived scene. Criticality-based prioritization allows limited machine resources (of lower-end embedded GPUs) to be spent more judiciously on tracking more important objects first. This paper explores a novel dimension in criticality-based prioritization of machine perception; namely, the role of criticality-dependent image resizing as a way to improve the trade-off between perception quality and timeliness. Given an assessment of criticality (e.g., an object’s distance from the autonomous car), the scheduler is allowed to choose from several image resizing options (and related inference models) before passing the resized images to the perception module. Experiments on an AI-powered embedded platform with a real-world driving dataset demonstrate significant improvements in the trade-off between perception accuracy and response time when the proposed resizing algorithm is used. The improvement is attributed to two advantages of the proposed scheme: (i) improved preferential treatment of more critical objects by reducing time spent on less critical ones, and (ii) improved image batching within the GPU, thanks to re-sizing, leading to better resource utilization.
机载计算能力仍然是在嵌入式硬件上运行的现代机器推理管道的关键瓶颈,例如机载无人驾驶飞机或汽车。为了缓解这一瓶颈,最近的工作提出了一种架构,用于分割复杂模式(如视频)的输入帧,并根据感知场景的各个片段的重要性对下游机器感知任务进行优先级排序。基于临界的优先级允许有限的机器资源(低端嵌入式gpu)更明智地用于首先跟踪更重要的对象。本文探讨了基于临界的机器感知优先级的一个新维度;也就是说,关键依赖的图像调整大小的作用,以改善感知质量和时效性之间的权衡。给定临界评估(例如,物体与自动驾驶汽车的距离),在将调整大小的图像传递给感知模块之前,调度程序可以从几个图像调整选项(以及相关的推理模型)中进行选择。在具有真实驾驶数据集的人工智能驱动的嵌入式平台上进行的实验表明,当使用所提出的调整大小算法时,在感知精度和响应时间之间的权衡方面有了显着改善。这种改进归功于所提出方案的两个优点:(i)通过减少在不太关键的对象上花费的时间,改善了对更关键对象的优先处理;(ii)由于重新调整大小,改进了GPU内的图像批处理,从而提高了资源利用率。
{"title":"On Exploring Image Resizing for Optimizing Criticality-based Machine Perception","authors":"Yigong Hu, Shengzhong Liu, T. Abdelzaher, Maggie B. Wigness, P. David","doi":"10.1109/RTCSA52859.2021.00027","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00027","url":null,"abstract":"On-board computing capacity remains a key bottleneck in modern machine inference pipelines that run on embedded hardware, such as aboard autonomous drones or cars. To mitigate this bottleneck, recent work proposed an architecture for segmenting input frames of complex modalities, such as video, and prioritizing downstream machine perception tasks based on criticality of the respective segments of the perceived scene. Criticality-based prioritization allows limited machine resources (of lower-end embedded GPUs) to be spent more judiciously on tracking more important objects first. This paper explores a novel dimension in criticality-based prioritization of machine perception; namely, the role of criticality-dependent image resizing as a way to improve the trade-off between perception quality and timeliness. Given an assessment of criticality (e.g., an object’s distance from the autonomous car), the scheduler is allowed to choose from several image resizing options (and related inference models) before passing the resized images to the perception module. Experiments on an AI-powered embedded platform with a real-world driving dataset demonstrate significant improvements in the trade-off between perception accuracy and response time when the proposed resizing algorithm is used. The improvement is attributed to two advantages of the proposed scheme: (i) improved preferential treatment of more critical objects by reducing time spent on less critical ones, and (ii) improved image batching within the GPU, thanks to re-sizing, leading to better resource utilization.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"123 1","pages":"169-178"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86776407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Optimal Recharging of Teams of Mobile Robots 移动机器人团队的最优充电
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00028
Anh-Duy Vu, Borzoo Bonakdarpour
In this paper, we propose an approach to extend the operational time of teams of battery-based robots by introducing a set of charging stations. We assume that the robots are heterogeneous (having different energy limits and being able to service different types of customers) and have access to a priori known map of the environment. The map is modeled as a directed, connected, and finite graph whose nodes are charging stations or customers, and arcs denote the possibility of traveling. To this end, we first formulate a task assignment and path planning problem that aims at optimizing energy consumption as well as the time needed to complete the tasks, including the time spent for recharging. Next, we propose four offline optimization techniques and one online algorithm, where the robots can dynamically adjust their paths in response to the presence of uncertainties imposed by the physical environment. Our proposed algorithms are validated through both simulation and a real-world case study on a team of unmanned aerial vehicles (UAVs) performing a joint search mission.
在本文中,我们提出了一种通过引入一组充电站来延长电池机器人团队运行时间的方法。我们假设机器人是异构的(具有不同的能量限制,能够服务不同类型的客户),并且可以访问先验已知的环境地图。该地图被建模为一个有向、连通和有限的图,其节点是充电站或客户,弧线表示旅行的可能性。为此,我们首先制定了一个任务分配和路径规划问题,以优化能耗和完成任务所需的时间,包括充电所需的时间。接下来,我们提出了四种离线优化技术和一种在线算法,其中机器人可以根据物理环境施加的不确定性动态调整其路径。我们提出的算法通过模拟和对执行联合搜索任务的无人驾驶飞行器(uav)团队的实际案例研究进行了验证。
{"title":"Optimal Recharging of Teams of Mobile Robots","authors":"Anh-Duy Vu, Borzoo Bonakdarpour","doi":"10.1109/RTCSA52859.2021.00028","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00028","url":null,"abstract":"In this paper, we propose an approach to extend the operational time of teams of battery-based robots by introducing a set of charging stations. We assume that the robots are heterogeneous (having different energy limits and being able to service different types of customers) and have access to a priori known map of the environment. The map is modeled as a directed, connected, and finite graph whose nodes are charging stations or customers, and arcs denote the possibility of traveling. To this end, we first formulate a task assignment and path planning problem that aims at optimizing energy consumption as well as the time needed to complete the tasks, including the time spent for recharging. Next, we propose four offline optimization techniques and one online algorithm, where the robots can dynamically adjust their paths in response to the presence of uncertainties imposed by the physical environment. Our proposed algorithms are validated through both simulation and a real-world case study on a team of unmanned aerial vehicles (UAVs) performing a joint search mission.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"27 1","pages":"179-188"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73597037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demand Characterization of CPS with Conditionally-Enabled Sensors 条件启用传感器的CPS需求特性
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00025
Aaron Willcock, N. Fisher, Thidapat Chantem
Characterizing computational demand of Cyber-Physical Systems (CPS) is critical for guaranteeing that multiple hard real-time tasks may be scheduled on shared resources without missing deadlines. In a CPS involving repetition such as industrial automation systems found in chemical process control or robotic manufacturing, sensors and actuators used as part of the industrial process may be conditionally enabled (and disabled) as a sequence of repeated steps is executed. In robotic manufacturing, for example, these steps may be the movement of a robotic arm through some trajectories followed by activation of end-effector sensors and actuators at the end of each completed motion. The conditional enabling of sensors and actuators produces a sequence of Monotonically Ascending Execution times (MAE) with lower WCET when the sensors are disabled and higher WCET when enabled. Since these systems may have several predefined steps to follow before repeating the entire sequence each unique step may result in several consecutive sequences of MAE. The repetition of these unique sequences of MAE result in a repeating WCET sequence. In the absence of an efficient demand characterization technique for repeating WCET sequences composed of subsequences with monotonically increasing execution time, this work proposes a new task model to describe the behavior of real-world systems which generate large repeating WCET sequences with subsequences of monotonically increasing execution times. In comparison to the most applicable current model, the Generalized Multiframe model (GMF), an empirically and theoretically faster method for characterizing the demand is provided. The demand characterization algorithm is evaluated through a case study of a robotic arm and simulation of 10,000 randomly generated tasks where, on average, the proposed approach is 231 and 179 times faster than the state-of-the-art in the case study and simulation respectively.
描述信息物理系统(CPS)的计算需求是保证多个硬实时任务在共享资源上调度而不错过截止日期的关键。在涉及重复的CPS中,例如在化学过程控制或机器人制造中发现的工业自动化系统,作为工业过程一部分的传感器和执行器可以在执行一系列重复步骤时有条件地启用(或禁用)。例如,在机器人制造中,这些步骤可能是机械臂通过一些轨迹的运动,然后在每个完成的运动结束时激活末端执行器传感器和致动器。传感器和执行器的条件启用会产生一系列单调递增的执行时间(MAE),当传感器被禁用时,WCET较低,当启用时,WCET较高。由于这些系统在重复整个序列之前可能有几个预定义的步骤要遵循,每个独特的步骤可能导致几个连续的MAE序列。这些独特的MAE序列的重复产生了重复的WCET序列。由于缺乏有效的需求表征技术来描述由执行时间单调增加的子序列组成的重复WCET序列,本工作提出了一个新的任务模型来描述现实世界系统的行为,该系统生成具有执行时间单调增加的子序列的大型重复WCET序列。与目前最适用的通用多帧模型(GMF)相比,提供了一种经验和理论上更快的表征需求的方法。通过对机械臂的案例研究和对10,000个随机生成任务的模拟,对需求表征算法进行了评估,在案例研究和模拟中,所提出的方法的平均速度分别比目前最先进的方法快231倍和179倍。
{"title":"Demand Characterization of CPS with Conditionally-Enabled Sensors","authors":"Aaron Willcock, N. Fisher, Thidapat Chantem","doi":"10.1109/RTCSA52859.2021.00025","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00025","url":null,"abstract":"Characterizing computational demand of Cyber-Physical Systems (CPS) is critical for guaranteeing that multiple hard real-time tasks may be scheduled on shared resources without missing deadlines. In a CPS involving repetition such as industrial automation systems found in chemical process control or robotic manufacturing, sensors and actuators used as part of the industrial process may be conditionally enabled (and disabled) as a sequence of repeated steps is executed. In robotic manufacturing, for example, these steps may be the movement of a robotic arm through some trajectories followed by activation of end-effector sensors and actuators at the end of each completed motion. The conditional enabling of sensors and actuators produces a sequence of Monotonically Ascending Execution times (MAE) with lower WCET when the sensors are disabled and higher WCET when enabled. Since these systems may have several predefined steps to follow before repeating the entire sequence each unique step may result in several consecutive sequences of MAE. The repetition of these unique sequences of MAE result in a repeating WCET sequence. In the absence of an efficient demand characterization technique for repeating WCET sequences composed of subsequences with monotonically increasing execution time, this work proposes a new task model to describe the behavior of real-world systems which generate large repeating WCET sequences with subsequences of monotonically increasing execution times. In comparison to the most applicable current model, the Generalized Multiframe model (GMF), an empirically and theoretically faster method for characterizing the demand is provided. The demand characterization algorithm is evaluated through a case study of a robotic arm and simulation of 10,000 randomly generated tasks where, on average, the proposed approach is 231 and 179 times faster than the state-of-the-art in the case study and simulation respectively.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"1 1","pages":"149-158"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90327780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Work-in-Progress Abstract: On the relationship between scheduling theory and real-time calculus 摘要:论调度理论与实时微积分的关系
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00030
F. Slomka, M. Sadeghi
In this ongoing research, we investigate the mathematical properties of the scheduling theory and the real-time calculus and their relationship to each other.
在本研究中,我们探讨了调度理论和实时微积分的数学性质及其相互关系。
{"title":"Work-in-Progress Abstract: On the relationship between scheduling theory and real-time calculus","authors":"F. Slomka, M. Sadeghi","doi":"10.1109/RTCSA52859.2021.00030","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00030","url":null,"abstract":"In this ongoing research, we investigate the mathematical properties of the scheduling theory and the real-time calculus and their relationship to each other.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"72 1","pages":"195-197"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86963832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway‡ 可信赖边缘物联网安全网关体系结构模型的形式化研究
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00019
Matthew McCormack, Amit Vasudevan, Guyue Liu, V. Sekar
Today’s edge networks continue to see an increasing number of deployed IoT devices. These IoT devices aim to increase productivity and efficiency; however, they are plagued by a myriad of vulnerabilities. Industry and academia have proposed protecting these devices by deploying a “bolt-on” security gateway to these edge networks. The gateway applies security protections at the network level. While security gateways are an attractive solution, they raise a fundamental concern: Can the bolt-on security gateway be trusted? This paper identifies key challenges in realizing this goal and sketches a roadmap for providing trust in bolt-on edge IoT security gateways. Specifically, we show the promise of using a micro-hypervisor driven approach for delivering practical (deployable today) trust that is catered to both end-users and gateway vendors alike in terms of cost, generality, capabilities, and performance. We describe the challenges in establishing trust on today’s edge security gateways, formalize the adversary and trust properties, describe our system architecture, encode and prove our architecture trust properties using the Alloy formal modeling language. We foresee our trustworthy security gateway architecture becoming a practical and extensible formal foundation towards realizing robust trust properties on today’s edge security gateway implementations.
今天的边缘网络继续看到越来越多的部署物联网设备。这些物联网设备旨在提高生产力和效率;然而,它们受到无数漏洞的困扰。工业界和学术界建议通过在这些边缘网络上部署“螺栓连接”安全网关来保护这些设备。网关在网络层面实施安全保护。虽然安全网关是一个很有吸引力的解决方案,但它们引发了一个根本性的问题:安全网关是否可信?本文确定了实现这一目标的关键挑战,并概述了在螺栓连接的边缘物联网安全网关中提供信任的路线图。具体来说,我们展示了使用微管理程序驱动的方法来交付实用的(现在可部署的)信任的承诺,这种信任在成本、通用性、功能和性能方面都满足最终用户和网关供应商的需求。我们描述了在当今边缘安全网关上建立信任的挑战,形式化了对手和信任属性,描述了我们的系统架构,使用Alloy形式化建模语言编码和证明了我们的架构信任属性。我们预计,我们的可信安全网关架构将成为一个实用的、可扩展的正式基础,从而在当今的边缘安全网关实现中实现健壮的信任属性。
{"title":"Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway‡","authors":"Matthew McCormack, Amit Vasudevan, Guyue Liu, V. Sekar","doi":"10.1109/RTCSA52859.2021.00019","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00019","url":null,"abstract":"Today’s edge networks continue to see an increasing number of deployed IoT devices. These IoT devices aim to increase productivity and efficiency; however, they are plagued by a myriad of vulnerabilities. Industry and academia have proposed protecting these devices by deploying a “bolt-on” security gateway to these edge networks. The gateway applies security protections at the network level. While security gateways are an attractive solution, they raise a fundamental concern: Can the bolt-on security gateway be trusted? This paper identifies key challenges in realizing this goal and sketches a roadmap for providing trust in bolt-on edge IoT security gateways. Specifically, we show the promise of using a micro-hypervisor driven approach for delivering practical (deployable today) trust that is catered to both end-users and gateway vendors alike in terms of cost, generality, capabilities, and performance. We describe the challenges in establishing trust on today’s edge security gateways, formalize the adversary and trust properties, describe our system architecture, encode and prove our architecture trust properties using the Alloy formal modeling language. We foresee our trustworthy security gateway architecture becoming a practical and extensible formal foundation towards realizing robust trust properties on today’s edge security gateway implementations.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"28 1","pages":"93-102"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81428632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Domain Software Architecture for Safe and Secure Autonomous Driving 面向安全自动驾驶的多域软件体系结构
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00017
Luca Belluardo, Andrea Stevanato, Daniel Casini, Giorgiomaria Cicero, Alessandro Biondi, G. Buttazzo
This work aims at making Apollo, a popular autonomous driving framework, safer and more secure by designing a multi-domain architecture, where its components are split between a feature-rich domain running Linux and a critical domain running a real-time operating system (RTOS). The two domains are isolated by a hypervisor. We implemented a prototype where the control component has been ported from Linux to the Erika automotive-grade RTOS, and we discuss a number of challenges that have been faced in moving the component to Erika. The proposed solution has been experimentally evaluated by measuring the latencies involving processing paths passing through the control component.
这项工作旨在通过设计一个多域架构,使Apollo(一个流行的自动驾驶框架)更安全,更可靠,其中其组件分为运行Linux的功能丰富的域和运行实时操作系统(RTOS)的关键域。这两个域由hypervisor隔离。我们实现了一个原型,其中控制组件已从Linux移植到Erika汽车级RTOS,并讨论了将组件迁移到Erika所面临的许多挑战。通过测量通过控制组件的处理路径的延迟,对所提出的解决方案进行了实验评估。
{"title":"A Multi-Domain Software Architecture for Safe and Secure Autonomous Driving","authors":"Luca Belluardo, Andrea Stevanato, Daniel Casini, Giorgiomaria Cicero, Alessandro Biondi, G. Buttazzo","doi":"10.1109/RTCSA52859.2021.00017","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00017","url":null,"abstract":"This work aims at making Apollo, a popular autonomous driving framework, safer and more secure by designing a multi-domain architecture, where its components are split between a feature-rich domain running Linux and a critical domain running a real-time operating system (RTOS). The two domains are isolated by a hypervisor. We implemented a prototype where the control component has been ported from Linux to the Erika automotive-grade RTOS, and we discuss a number of challenges that have been faced in moving the component to Erika. The proposed solution has been experimentally evaluated by measuring the latencies involving processing paths passing through the control component.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"1 1","pages":"73-82"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90401143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Graph-Based Optimizations for Multiprocessor Nested Resource Sharing 基于图的多处理器嵌套资源共享优化
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00023
Junjie Shi, Niklas Ueter, G. V. D. Brüggen, Jian-Jia Chen
Multiprocessor resource synchronization and locking protocols are of great importance to utilize the computation power of multiprocessor real-time systems. Hence, in the past decades a large number of protocols have been developed and analyzed. The recently proposed dependency graph approach has significantly improved the schedulability for frame-based and periodic real-time task systems. However, the dependency graph approach only supports non-nested resource access, i.e., each critical section can only access one shared resource. In this paper, we develop a dependency graph based protocol that allows nested resource access, where a critical section can access multiple shared resources at the same time. First, constraint programming is applied to construct a dependency graph that determines the execution order of critical sections. Afterwards, a schedule is generated based on this order. To show the feasibility of our proposed protocol, we provide extensive numerical evaluations under different configurations. The evaluation results show that our approach has very good performance with respect to schedulability for frame-based and periodic real-time task systems, whereas the existing results applicable for sporadic task systems have worse performance under such a limited setting.
多处理器资源同步和锁定协议对于充分利用多处理器实时系统的计算能力具有重要意义。因此,在过去的几十年里,已经开发和分析了大量的协议。最近提出的依赖图方法显著提高了基于框架和周期性实时任务系统的可调度性。然而,依赖图方法只支持非嵌套资源访问,也就是说,每个关键部分只能访问一个共享资源。在本文中,我们开发了一个基于依赖图的协议,该协议允许嵌套资源访问,其中一个关键部分可以同时访问多个共享资源。首先,应用约束规划构造依赖图,确定关键段的执行顺序。然后,根据这个顺序生成一个计划。为了证明我们提出的协议的可行性,我们在不同的配置下进行了广泛的数值评估。评估结果表明,我们的方法在基于帧和周期的实时任务系统的可调度性方面具有很好的性能,而现有的用于零星任务系统的结果在这种有限的设置下性能较差。
{"title":"Graph-Based Optimizations for Multiprocessor Nested Resource Sharing","authors":"Junjie Shi, Niklas Ueter, G. V. D. Brüggen, Jian-Jia Chen","doi":"10.1109/RTCSA52859.2021.00023","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00023","url":null,"abstract":"Multiprocessor resource synchronization and locking protocols are of great importance to utilize the computation power of multiprocessor real-time systems. Hence, in the past decades a large number of protocols have been developed and analyzed. The recently proposed dependency graph approach has significantly improved the schedulability for frame-based and periodic real-time task systems. However, the dependency graph approach only supports non-nested resource access, i.e., each critical section can only access one shared resource. In this paper, we develop a dependency graph based protocol that allows nested resource access, where a critical section can access multiple shared resources at the same time. First, constraint programming is applied to construct a dependency graph that determines the execution order of critical sections. Afterwards, a schedule is generated based on this order. To show the feasibility of our proposed protocol, we provide extensive numerical evaluations under different configurations. The evaluation results show that our approach has very good performance with respect to schedulability for frame-based and periodic real-time task systems, whereas the existing results applicable for sporadic task systems have worse performance under such a limited setting.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"13 1","pages":"129-138"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77943494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Title page i] [标题页i]
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/rtcsa52859.2021.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/rtcsa52859.2021.00001","DOIUrl":"https://doi.org/10.1109/rtcsa52859.2021.00001","url":null,"abstract":"","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"181 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72423955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Work-in-Progress Abstract: WKS, a local unsupervised statistical algorithm for the detection of transitions in timing analysis 摘要:WKS是一种局部无监督统计算法,用于检测时序分析中的过渡
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-08-01 DOI: 10.1109/RTCSA52859.2021.00032
Marwan Wehaiba el Khazen, L. Cucu-Grosjean, A. Gogonel, Hadrien A. Clarke, Y. Sorel
The increased complexity of programs and processors is an important challenge that the embedded real-time systems community faces today, as it implies substancial timing variability. Processor features like pipelines or communication buses are not always completely described, while black-box programs integrated by third parties are hidden for IP reasons. This situation explains the use of statistical approaches to study the timing variability of programs. Most existing work is concentrated on the guarantees provided by positive answers to statistical tests, while our current work concerns potential algorithms based on the negative answers to these tests and their impact on the timing analysis. We introduce here one such algorithm, the Walking Kolmogorov-Smirnov test (WKS).
程序和处理器复杂性的增加是嵌入式实时系统社区今天面临的一个重要挑战,因为它意味着大量的时间可变性。处理器功能,如管道或通信总线并不总是完全描述,而由第三方集成的黑箱程序由于IP原因是隐藏的。这种情况解释了使用统计方法来研究程序的时间可变性的原因。大多数现有的工作都集中在统计测试的正面答案所提供的保证上,而我们目前的工作关注的是基于这些测试的负面答案及其对时间分析的影响的潜在算法。我们在这里介绍一个这样的算法,行走Kolmogorov-Smirnov测试(WKS)。
{"title":"Work-in-Progress Abstract: WKS, a local unsupervised statistical algorithm for the detection of transitions in timing analysis","authors":"Marwan Wehaiba el Khazen, L. Cucu-Grosjean, A. Gogonel, Hadrien A. Clarke, Y. Sorel","doi":"10.1109/RTCSA52859.2021.00032","DOIUrl":"https://doi.org/10.1109/RTCSA52859.2021.00032","url":null,"abstract":"The increased complexity of programs and processors is an important challenge that the embedded real-time systems community faces today, as it implies substancial timing variability. Processor features like pipelines or communication buses are not always completely described, while black-box programs integrated by third parties are hidden for IP reasons. This situation explains the use of statistical approaches to study the timing variability of programs. Most existing work is concentrated on the guarantees provided by positive answers to statistical tests, while our current work concerns potential algorithms based on the negative answers to these tests and their impact on the timing analysis. We introduce here one such algorithm, the Walking Kolmogorov-Smirnov test (WKS).","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"26 1","pages":"201-203"},"PeriodicalIF":0.7,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88626110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Embedded and Real-Time Communication Systems (IJERTCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1