Filters








91,550 Hits in 11.4 sec

Robust Mixed-Criticality Systems

Alan Burns, Robert I. Davis, Sanjoy Baruah, Iain Bate
2018 IEEE transactions on computers  
With mixed-criticality systems, fault tolerance must be criticality aware, i.e. some tasks should degrade less than others.  ...  Analysis is developed for fail operational and fail robust behaviour, optimal priority ordering is addressed and an experimental evaluation is described.  ...  on Mixed Criticality for useful discussions on the topic of this paper.  ... 
doi:10.1109/tc.2018.2831227 fatcat:c2iwxht44bejvbsd65svwsnlpi

A resource management survey for mission-critical and time-critical applications in multiaccess edge computing

Nina Santi, Nathalie Mitton
2021 ITU Journal  
Moreover, it enables MEC resources embedded on mobile units like drones or robots that are flexible to be deployed for mission-critical applications.  ...  We believe this work could serve as a helping hand to design efficient MEC resource management schemes that respond to challenging environments such as mission-critical applications.  ...  [80] use a modi ied generalized Benders decomposition for latency-sensitive services with caching to minimize the overall latency.  ... 
doi:10.52953/bqvo3992 fatcat:ubjqqgzd5fdfpeumdyd4pdu7su

A resource management survey for mission critical and time critical applications in multi access edge computing

Nina Santi, Nathalie Mitton
2022 Zenodo  
We believe this work could serve as a helping hand to design efficient MEC resource management schemes that respond to challenging environments such as mission-critical applications.  ...  This proximity is beneficial, especially for mission-critical applications where each second matters, such as disaster management or military operations.  ...  [80] use a modified generalized Benders decomposition for latency-sensitive services with caching to minimize the overall latency.  ... 
doi:10.5281/zenodo.6082951 fatcat:wbln2fjhy5hmtjvv3pq7s2oxuu

Mastering MPSoCs for Mixed-critical Applications

Philip Axer, Jonas Diemer, Mircea Negrean, Maurice Sebastian, Simon Schliecker, Rolf Ernst
2011 IPSJ Transactions on System LSI Design Methodology  
In this paper, challenges in the design of mixed-critical systems are discussed and formal analysis solutions which consider shared resources, NoC communication, multi-mode applications and their reliabilities  ...  (mixed-criticality), validation faces new challenges.  ...  Acknowledgments This work has been funded by the "Bundesministerium für Bildung und Forschung" (BMBF), the "Deutsche Forschungsgemeinschaft" (DFG) and the Advanced Research & Technology for Embedded Intelligence  ... 
doi:10.2197/ipsjtsldm.4.91 fatcat:s7rsjf7dp5ds3o6cqoagy5c6q4

A Survey of Research into Mixed Criticality Systems

Alan Burns, Robert I. Davis
2017 ACM Computing Surveys  
Systems with more than one criticality level that only aim to give complete isolation are called multiple-criticality systems; the use of mixed-criticality implies some tradeoff between isolation and integration  ...  The criticality of a component determines the level of rigour applied in the design and analysis used to determine its correct functionality and resource usage (e.g. processor execution time, communication  ...  Acknowledgements The authors would like to thank Sanjoy Baruah for a number of very useful discussions on MCS.  ... 
doi:10.1145/3131347 fatcat:6ax3uztmjnaelgzwipjdcsfuaa

Identifying and using energy-critical paths

Nedeljko Vasić, Prateek Bhurat, Dejan Novaković, Marco Canini, Satyam Shekhar, Dejan Kostić
2011 Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies on - CoNEXT '11  
In this paper, we propose REsPoNse, a framework which overcomes the optimalityscalability trade-off.  ...  The insight in REsPoNse is to identify a few energy-critical paths off-line, install them into network elements, and use a simple online element to redirect the traffic in a way that enables large parts  ...  Our sensitivity analysis shows that excluding 20% of the links with the highest stress is sufficient to produce a set of paths that together with the always-on paths can accommodate peak-hour traffic demands  ... 
doi:10.1145/2079296.2079314 dblp:conf/conext/VasicBNCSK11 fatcat:bnptstyvcndqhpmeexljqqlp5m

Modelling Security of Critical Infrastructures: A Survivability Assessment

Ricardo J. Rodríguez, José Merseguer, Simona Bernardi
2014 Computer journal  
In this paper, we present a UML profile, named SecAM, that enables the modelling and security specification for critical infrastructures during the early phases (requirements, design) of systems development  ...  The stochastic analysis, carried out with Generalized Stochastic Petri nets, quantitatively estimates the minimisation of attack damages into the crude-oil network.  ...  Although the paper illustrates qualitative analysis and vulnerability analysis, the Petri net also allows to compute resource optimisation of the critical infrastructure, and to provide feedback to the  ... 
doi:10.1093/comjnl/bxu096 fatcat:ruq24u37qbgljbw4t337ysnfdu

Mixed criticality systems with weakly-hard constraints

Oliver Gettings, Sophie Quinton, Robert I. Davis
2015 Proceedings of the 23rd International Conference on Real Time and Networks Systems - RTNS '15  
Mixed criticality systems contain components of at least two criticality levels which execute on a common hardware platform in order to more efficiently utilise resources.  ...  trade-off between existing fixed priority preemptive and adaptive mixed criticality policies.  ...  [102] have developed a processor with native hardware support for mixed criticality systems.  ... 
doi:10.1145/2834848.2834850 dblp:conf/rtns/GettingsQD15 fatcat:hyspiukiifh7npsbtjkb7pmg7e

Towards Enabling Critical mMTC: A Review of URLLC within mMTC [article]

Shiva Raj Pokhrel, Jie Ding, Jihong Park, Ok-Sun Park, Jinho Choi
2020 arXiv   pre-print
mMTC (e.g., < 4ms latency, 10^6 devices/km^2 for factory automation) with limited radio resources.  ...  and computing capability that should be (tightly) optimized for given tasks.  ...  We anticipate that such a cooperative hybrid approach will address the diverse natural challenges of a mix of delay-sensitive and delaytolerant devices . d) Clustering with Data Segregation: By categorizing  ... 
arXiv:2007.08793v1 fatcat:khi7rve3evbtvpglik3fo3pqdy

Schedulability of probabilistic mixed-criticality systems

Stefan Draskovic, Rehan Ahmed, Pengcheng Huang, Lothar Thiele
2021 Real-time systems  
When this is done, the usual assumption is that tasks of lower criticality are degraded when a higher criticality task needs more resources, for example when it overruns a bound on its execution time.  ...  AbstractMixed-criticality systems often need to fulfill safety standards that dictate different requirements for each criticality level, for example given in the 'probability of failure per hour' format  ...  Appendix: Computational complexity of the analysis Here we comment on the computational complexity of our proposed probabilistic Mixed Criticality (pMC) schedulability analysis.  ... 
doi:10.1007/s11241-021-09365-4 fatcat:uxvyopb2f5gwxeu5vjocw2jti4

Towards Enabling Critical mMTC: A Review of URLLC within mMTC

Shiva Raj Pokhrel, Jie Ding, Jihong Park, Ok-Sun Park, Jinho Choi
2020 IEEE Access  
In this section, we discuss potential enablers for critical mMTC where URLLC (or delay-sensitive) devices and non-URLLC (or delay-tolerant) devices co-exist with different requirements. A.  ...  There is a significant trade-off between number of resource blocks and level of modulation and coding scheme -to ensure desired QoS requirements for each (mobile/virtual) network operators.  ... 
doi:10.1109/access.2020.3010271 fatcat:of6t76qsqnecpnawfp7y2m2upy

Pulsar: A resource-control architecture for time-critical service-oriented applications

M. Astley, S. Bhola, M. J. Ward, K. Shagin, H. Paz, G. Gershinsky
2008 IBM Systems Journal  
Components of an applica- tion may be distributed, and may compete with other distributed applications for resources such as CPU, networking bandwidth, and memory; Mixed requirements.  ...  Analysis The analysis of job flow and resource allocation combines models of job flow latency and resource utilization to maximize a system scheduling objec- tive.  ... 
doi:10.1147/sj.472.0265 fatcat:cmogezvfgngzhggfao4a4qphoa

Software Composability and Mixed Criticality for Triple Modular Redundant Architectures

Stefan Resch, Andreas Steininger, Christoph Scherrer
2013 International Conference on Computer Safety, Reliability, and Security  
Composability and mixed criticality are concepts that promise an ease of development and certification for safety critical systems in all industrial domains.  ...  We evaluate the needed adaptations and extensions of triplication mechanisms with respect to the required safety properties.  ...  However, composability and mixed-criticality can achieve good resource utilization, as non-critical FSs are not replicated.  ... 
dblp:conf/safecomp/ReschSS13 fatcat:j5ynh73m2vdxtn45rmy637762y

Critical factors for unconventional hydrocarbon resources development

Oscar Bravo M, Diego Hernández
2021 CT&F - Ciencia  
Countries all over the world struggle to exploit their Unconventional Hydrocarbon Resources (UHR) to secure energy supply, but only a few of them have succeeded.  ...  We assessed the UHR exploiting state in 60 countries and identified the critical common development factors for the 22 that are most active.  ...  With about 9,000 IOCs, the US is the country that represents the ideal enterprise mix for UOGD.  ... 
doi:10.29047/01225383.253 fatcat:2pf75y7wbfa5rfn5gn6jbsua3q

A Framework for Modeling Non-Functional Requirements for Business-Critical Systems

Sameer S Paradkar, Enterprise Architect, ATOS, Architecture Group, Business & Platform Solutions, Mumbai, India
2021 International Journal of Innovative Research in Computer Science & Technology  
Analysis of NFRs Architecture trade-off analysis method -ATAM methodology from the Software Engineering Institute -SEI is a Method to analyze NFR for Architectural Quality Attributes.  ...  Therefore, the elicitation technique has to be designed in manner that it will interact closely with the stakeholders. A major challenge of NFR is the trade-off analysis and sizing of NFRs.  ... 
doi:10.21276/ijircst.2021.9.1.3 fatcat:y6qurutstzbzlfmyp5bmqhdgb4
« Previous Showing results 1 — 15 out of 91,550 results