Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/85698
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor林忠緯(Chung-Wei Lin)
dc.contributor.authorYi-Ting Hsiehen
dc.contributor.author謝議霆zh_TW
dc.date.accessioned2023-03-19T23:21:50Z-
dc.date.copyright2022-07-05
dc.date.issued2022
dc.date.submitted2022-06-18
dc.identifier.citationL. Ahrendts, S. Quinton, T. Boroske, and R. Ernst, “Verifying weakly-hard real-time properties of traffic streams in switched networks,” in Euromicro Conference on Real-Time Systems, vol. 106, pp. 15:1–15:22, 2018. G. Bernat, A. Burns, and A. Liamosi, “Weakly hard real-time systems,” IEEE Transactions on Computers, vol. 50, no. 4, pp. 308–321, 2001. G. Bernat and R. Cayssials, “Guaranteed on-line weakly-hard real-time systems,” in IEEE Real-Time Systems Symposium, pp. 22–35. IEEE, 2001. E. Bini, “Measuring the performance of schedulability tests,” Real-Time Systems, vol. 30, pp. 129–154, 05 2005. H. Choi, H. Kim, and Q. Zhu, “Job-class-level fixed priority scheduling of weakly-hard real-time systems,” in IEEE Real-Time Technology and Applications Symposium, pp. 241–253. IEEE, 2019. P. S. Duggirala and M. Viswanathan, “Analyzing real time linear control systems using software verification,” in IEEE Real-Time Systems Symposium, pp. 216–226, IEEE. IEEE, 2015. G. Frehse, A. Hamann, S. Quinton, and M. Woehrle, “Formal analysis of timing effects on closed-loop properties of control software,” in IEEE Real-Time Systems Symposium, pp. 53–62. IEEE, 2014. 60 61 G. Frehse, C. Le Guernic, A. Donz´e, S. Cotton, R. Ray, O. Lebeltel, R. Ripado, A. Girard, T. Dang, and O. Maler, “Spaceex: Scalable verification of hybrid systems,” in International Conference on Computer-Aided Verification, pp. 379–395, Springer. Springer, 2011. A. Gujarati, M. Nasri, R. Majumdar, and B. Brandenburg, “From iteration to system failure: Characterizing the fitness of periodic weakly-hard systems,” in Euromicro Conference on Real-Time Systems, pp. 9:1–9:23, 2019. M. Hamdaoui and P. Ramanathan, “A dynamic priority assignment technique for streams with (m, k)-firm deadlines,” IEEE Transactions on Computers, vol. 44, no. 12, pp. 1443–1451, 1995. Z. A. H. Hammadeh, R. Ernst, S. Quinton, R. Henia, and L. Rioux, “Bounding deadline misses in weakly-hard real-time systems with task dependencies,” in Design, Automation and Test in Europe Conference, pp. 584–589, 2017. Z. A. H. Hammadeh, S. Quinton, M. Panunzio, R. Henia, L. Rioux, and R. Ernst, “Budgeting under-specified tasks for weakly-hard real-time systems,” in Euromicro Conference on Real-Time Systems, vol. 76, pp. 17:1–17:22, 2017. Z. Hammadeh, S. Quinton, and R. Ernst, “Extending typical worst-case analysis using response-time dependencies to bound deadline misses,” 10 2014. C. Huang, K.-C. Chang, C.-W. Lin, and Q. Zhu, “Saw: A tool for safety analysis of weakly-hard systems,” in Computer Aided Verification, S. K. Lahiri and C. Wang, Eds., pp. 543–555. Cham: Springer International Publishing, 2020. 62 C. Huang, W. Li, and Q. Zhu, “Formal verification of weakly-hard systems,” in ACM International Conference on Hybrid Systems: Computation and Control, pp. 197–207. ACM, 2019. C. Huang, K. Wardega, W. Li, and Q. Zhu, “Exploring weakly-hard paradigm for networked systems,” in Workshop on Design Automation for CPS and IoT, p. 51–59, 2019. J. Li, Y. Song, and F. Simonot-Lion, “Providing real-time applications with graceful degradation of QoS and fault tolerance according to (m, k)-firm model,” IEEE Transactions on Industrial Informatics, vol. 2, no. 2, pp. 112– 119, 2006. H. Liang, Z. Wang, D. Roy, S. Dey, S. Chakraborty, and Q. Zhu, “Securitydriven codesign with weakly-hard constraints for real-time embedded systems,” in IEEE International Conference on Computer Design (ICCD), pp. 217–226. IEEE, 2019. S. Quinton and R. Ernst, “Generalized weakly-hard constraints,” in International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, pp. 96–110. Springer, 2012. S. Quinton, M. Hanke, and R. Ernst, “Formal analysis of sporadic overload in real-time systems,” in 2012 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 515–520, 2012. S. Quinton, M. Negrean, and R. Ernst, “Formal analysis of sporadic bursts in real-time systems,” pp. 767–772, 01 2013. 63 Y. Sun and M. Di Natale, “Weakly hard schedulability analysis for fixed priority scheduling of periodic real-time tasks,” ACM Transactions on Embedded Computing Systems, vol. 16, no. 5s, pp. 171:1–171:19, 2017. S.-L. Wu, C.-Y. Bai, K.-C. Chang, Y.-T. Hsieh, C. Huang, C.-W. Lin, E. Kang, and Q. Zhu, “Efficient system verification with multiple weakly-hard constraints for runtime monitoring,” in Runtime Verification, J. Deshmukh and D. Niˇckovi´c, Eds., pp. 497–516. Cham: Springer International Publishing, 2020. W. Xu, Z. A. H. Hammadeh, A. Kr¨oller, R. Ernst, and S. Quinton, “Improved deadline miss models for real-time systems using typical worst-case analysis,” in Euromicro Conference on Real-Time Systems, pp. 247–256, 2015.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/85698-
dc.description.abstract一個弱硬式錯誤模型可以用(m, k)來描述,代表在k個連續的事件中,最多只有m個錯誤的事件。這篇論文我們用弱硬式錯誤模型來約束系統的一個輸入,我們提出的方法可以快速的在所有可能的(m, k)下驗證系統的性質,在驗證完所有的(m, k)後,我們可以知道系統需要被約束在甚麼條件下才能保有該性質,並且我們可以設計一個即時監控來偵測目前錯誤的數量,如果偵測到的系統輸入符合弱硬式條件的需求,我們可以保證系統的性質;否則,即時監控可以讓系統進入到一個安全的模式。這對於需要在有限資源和存在錯誤的情況下提供保證的網宇實體系統尤其重要,離散二階控制、網絡路由、車輛跟隨和車道變換的實驗結果證明了所提出方法的普遍性和效率。此外,考慮到多個系統共享一個處理器,需要一個排程器,由於在排程過程中應保證系統的特性,系統設計人員可以將驗證結果中的弱硬約束分配給系統。調度器必須確保資源分配能夠滿足約束,我們還提出了多個弱硬條件下的排程性分析方法,並將我們的方法與其他排程性分析方法進行比較以證明其通用性。驗證可以為系統設計提供策略,排程性分析可以幫助系統設計人員分析策略是否可行。zh_TW
dc.description.abstractA weakly-hard fault model can be captured by an (m,k) constraint, where 0 <= m <= k, meaning that there are at most m bad events (faults) among any k consecutive events. In this thesis, we use a weakly-hard fault model to constrain the occurrences of faults in system inputs. We develop approaches to verify properties for all possible values of (m,k), where k is smaller than or equal to a given K, in an exact and efficient manner. By verifying all possible values of (m,k), we define weakly-hard requirements for the system environment and design a runtime monitor based on counting the number of faults in system inputs. If the system environment satisfies the weakly-hard requirements, the satisfaction of desired properties is guaranteed; otherwise, the runtime monitor can notify the system to switch to a safe mode. This is especially essential for cyber-physical systems which need to provide guarantees with limited resources and the existence of faults. Experimental results with discrete second-order control, network routing, vehicle following, and lane changing demonstrate the generality and the efficiency of the proposed approaches. Moreover, considering multiple systems sharing a processor, a scheduler is needed. Since properties of systems should be guaranteed during the scheduling process, system designers can assign weakly-hard constraints from the verification results to systems. The scheduler has to make sure the resources distribution can satisfy the constraints. We also propose the schedulability analysis method under multiple weakly-hard constraints and compare our method with other schedulability analysis methods to demonstrate the generality. The verification can give the strategy to system design ,and the schedulability analysis can help system designers analyze whether the strategy is feasible or not.en
dc.description.provenanceMade available in DSpace on 2023-03-19T23:21:50Z (GMT). No. of bitstreams: 1
U0001-1806202211544600.pdf: 1645837 bytes, checksum: 5d1fde0a578279aff7ad2235c41c8f0c (MD5)
Previous issue date: 2022
en
dc.description.tableofcontentsAcknowledgements ii Abstract (Chinese) iii Abstract v List of Tables x List of Figures xi Chapter 1. Introduction 1 1.1 Motivations 1 1.2 Related Works 2 1.3 Contributions 3 1.4 Organization 7 Chapter 2. System Model and Problem Formulation 8 2.1 Weakly-Hard Verification 8 2.2 Weakly-Hard Scheduling 10 Chapter 3. General Approaches and Runtime Monitor Design 12 3.1 Strength of Weakly-Hard Constraint 12 3.2 Monotonic Approach 13 3.3 Monotonic Approach with Dynamic Upper Bound of Satisfaction Boundary 15 3.4 Lowest-Cost-First Heuristic 18 3.5 Runtime Monitor Design 19 Chapter 4. Discussion on Optimal Approaches 21 4.1 Definitions 21 4.2 Optimal Verified Set Computation 23 4.3 Correctness and Uniqueness 24 4.3.1 Other Single-Constraint Implications 25 4.3.2 Multiple-Constraint Implications 27 4.3.3 Completion of Proof 28 Chapter 5. Reachability Analysis for Finite-State Machines 30 5.1 Problem Definition 30 5.2 Mask-Compressing Approach 31 5.3 Layered BFS Approach 33 5.4 Dual-Layered BFS Approach 35 Chapter 6. Schedulability Analysis 37 6.1 Job Trace Model 37 6.2 Maximum Interrupt Jobs 38 6.3 Worst-Case Response Time 40 6.4 Job Trace Model Reconstruction 41 Chapter 7. Experimental Results 44 7.1 Weakly-Hard Verification 44 7.1.1 Discrete Second-Order Control 44 7.1.1.1 Setting 44 7.1.1.2 Experiment on |Q| 45 7.1.1.3 Experiment on K 47 7.1.2 Network Routing 47 7.1.2.1 Setting 47 7.1.2.2 Experiment on |Q| 50 7.1.2.3 Experiment on K 51 7.1.3 Lane Changing 51 7.1.3.1 Setting 51 7.1.3.2 Experiment on |Q| 54 7.1.3.3 Experiment on K 55 7.1.4 Summary 55 7.2 Weakly-Hard Scheduling 55 7.2.1 Taskset Generation 56 7.2.2 Schedulability Analysis Comparison 56 Chapter 8. Conclusions 58 Bibliography 60
dc.language.isoen
dc.subject正規式驗證zh_TW
dc.subject即時監控zh_TW
dc.subject排程性分析zh_TW
dc.subject弱硬式模型zh_TW
dc.subjectruntime monitoringen
dc.subjectschedulability analysisen
dc.subjectweakly-hard modelsen
dc.subjectformal verificationen
dc.title弱硬式網宇實體系統之驗證與排程性分析zh_TW
dc.titleVerification and Schedulability Analysis for Cyber-Physical Systems with Multiple Weakly-Hard Constraintsen
dc.typeThesis
dc.date.schoolyear110-2
dc.description.degree碩士
dc.contributor.oralexamcommittee蕭旭君(Hsu-Chun Hsiao),黎士瑋(Shih-Wei Li),陳尚澤(Shang-Tse Chen)
dc.subject.keyword正規式驗證,即時監控,弱硬式模型,排程性分析,zh_TW
dc.subject.keywordformal verification,runtime monitoring,weakly-hard models,schedulability analysis,en
dc.relation.page63
dc.identifier.doi10.6342/NTU202200995
dc.rights.note同意授權(全球公開)
dc.date.accepted2022-06-21
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
dc.date.embargo-lift2022-07-05-
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
U0001-1806202211544600.pdf1.61 MBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved