System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints

Author:

Hsieh Yi-Ting1ORCID,Chang Tzu-Tao1ORCID,Tsai Chen-Jun1ORCID,Wu Shih-Lun1ORCID,Bai Ching-Yuan1ORCID,Chang Kai-Chieh1ORCID,Lin Chung-Wei1ORCID,Kang Eunsuk2ORCID,Huang Chao3ORCID,Zhu Qi4ORCID

Affiliation:

1. National Taiwan University, Taiwan

2. Carnegie Mellon University, USA

3. University of Liverpool, UK

4. Northwestern University, USA

Abstract

A weakly-hard fault model can be captured by an (m,k) constraint, where 0≤ mk , meaning that there are at most m bad events (faults) among any k consecutive events. In this article, we use a weakly-hard fault model to constrain the occurrences of faults in system inputs. We develop approaches to verify properties for all possible values of (m,k) , where k is smaller than or equal to a given  K , in an exact and efficient manner. By verifying all possible values of (m,k) , we define weakly-hard requirements for the system environment and design a runtime monitor based on counting the number of faults in system inputs. If the system environment satisfies the weakly-hard requirements, then the satisfaction of desired properties is guaranteed; otherwise, the runtime monitor can notify the system to switch to a safe mode. This is especially essential for cyber-physical systems that need to provide guarantees with limited resources and the existence of faults. Experimental results with discrete second-order control, network routing, vehicle following, and lane changing demonstrate the generality and the efficiency of the proposed approaches.

Funder

Asian Office of Aerospace Research and Development

Office of Naval Research Global

Taiwan Ministry of Education

Taiwan National Science and Technology Council

US National Science Foundation

Office of Naval Research

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference28 articles.

1. L. Ahrendts, S. Quinton, T. Boroske, and R. Ernst. 2018. Verifying weakly-hard real-time properties of traffic streams in switched networks. In Euromicro Conference on Real-Time Systems, Vol. 106. 15:1–15:22.

2. Weakly hard real-time systems

3. G. Bernat and R. Cayssials. 2001. Guaranteed on-line weakly-hard real-time systems. In IEEE Real-Time Systems Symposium. IEEE, 22–35.

4. Towards Networked Control Systems with guaranteed stability: Using weakly hard real-time constraints to model the loss process

5. H. Choi, H. Kim, and Q. Zhu. 2019. Job-class-level fixed priority scheduling of weakly-hard real-time systems. In IEEE Real-Time Technology and Applications Symposium. IEEE, 241–253.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3