Mechatronic systems request for high reliability, especially in the context of time where mostly hard real-time capabilities are mandatory. Maybe even stronger requirements regard the robustness against software failures and interdependences from erroneous tasks to others. This paper proposes the concept of robust partitioning for reliable real-time embedded systems. The concept consists of two parts, memory space protection and time protection. Memory protection is realized by already existing hardware and software mechanisms. For realizing temporal protection, a two-step timer interrupt system realizing an imprecise computation concept is proposed: If the execution of a module exceeds a certain time limit before the deadline, the first ti...
Dependable real-time embedded systems are typically composed of a number of heterogeneous computing ...
Abstract—We present an approach to the synthesis of fault-tol-erant hard real-time systems for safet...
This dissertation explores the use of capability security hardware and software in real-time and lat...
In this paper, we focus on the temporal robustness in the hard real-time multiprocessor systems. Thi...
International audienceIn this paper, we consider the problem of fixed-priority partitioned schedulin...
The design of real-time embeddedsystems involves a constant trade-offbetween meeting real-time desig...
Abstract. In this paper, we consider the problem of fixed-priority par-titioned scheduling of sporad...
Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling ...
Real-time systems must provide functionalities that need to produce their results within predefined ...
International audienceWe propose to handle execution duration overruns (temporal faults) in real-tim...
Abstract—In this paper we are interested in mixed-criticality embedded real-time applications mapped...
An algorithm (called FTM) for scheduling of real-time sporadic tasks on a multicore platform is prop...
Abstract. Although computers have been employed for decades to control machinery and entire laborato...
In recent years, the automotive field is undergoing significant changes to improve safety, comfort o...
International audienceCertification of safety-critical systems requires a separation of certified an...
Dependable real-time embedded systems are typically composed of a number of heterogeneous computing ...
Abstract—We present an approach to the synthesis of fault-tol-erant hard real-time systems for safet...
This dissertation explores the use of capability security hardware and software in real-time and lat...
In this paper, we focus on the temporal robustness in the hard real-time multiprocessor systems. Thi...
International audienceIn this paper, we consider the problem of fixed-priority partitioned schedulin...
The design of real-time embeddedsystems involves a constant trade-offbetween meeting real-time desig...
Abstract. In this paper, we consider the problem of fixed-priority par-titioned scheduling of sporad...
Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling ...
Real-time systems must provide functionalities that need to produce their results within predefined ...
International audienceWe propose to handle execution duration overruns (temporal faults) in real-tim...
Abstract—In this paper we are interested in mixed-criticality embedded real-time applications mapped...
An algorithm (called FTM) for scheduling of real-time sporadic tasks on a multicore platform is prop...
Abstract. Although computers have been employed for decades to control machinery and entire laborato...
In recent years, the automotive field is undergoing significant changes to improve safety, comfort o...
International audienceCertification of safety-critical systems requires a separation of certified an...
Dependable real-time embedded systems are typically composed of a number of heterogeneous computing ...
Abstract—We present an approach to the synthesis of fault-tol-erant hard real-time systems for safet...
This dissertation explores the use of capability security hardware and software in real-time and lat...