Search for dissertations about: "Mixed-Criticality Systems"
Found 5 swedish dissertations containing the words Mixed-Criticality Systems.
-
1. Synthesis of Safety-Critical Real-Time Systems
Abstract : Modern safety-critical real-time systems are becoming more and more complex, due to sophisticated applications such as advanced driving assistance, automated driving, advanced infotainment, and applications involving machine learning and deep learning. This has led to increased requirements for the communication infrastructures. READ MORE
-
2. Three Aspects of Real-Time Multiprocessor Scheduling: Timeliness, Fault Tolerance, Mixed Criticality
Abstract : The design of real-time systems faces two important challenges: incorporating more functions/services on existing hardware to make the system more attractive to the market, and deploying existing software on multiprocessors (e.g., multicore) to utilize moreprocessing power. READ MORE
-
3. Enabling Industrial IoT Applications : Supporting Reliable and Real-Time Data Delivery
Abstract : The Industrial Internet of Things (IIoT) has become a promising technology for the improvement of the productivity, efficiency, and intelligence of the manufacturing process. Industrial Wireless Sensor Networks (IWSNs) represent a main pillar of IIoT to support communications within the field network level. READ MORE
-
4. Models and Complexity Results in Real-Time Scheduling Theory
Abstract : When designing real-time systems, we want to prove that they will satisfy given timing constraints at run time. The main objective of real-time scheduling theory is to analyze properties of mathematical models that capture the temporal behaviors of such systems. READ MORE
-
5. New Strategies for Ensuring Time and Value Correctness in Dependable Real-Time Systems
Abstract : Dependable real-time embedded systems are typically composed of a number of heterogeneous computing nodes, heterogeneous networks that connect them and tasks with multiple criticality levels allocated to the nodes. The heterogeneous nature of the hardware, results in a varying vulnerability to different types of hardware failures. READ MORE