[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3576914.3587511acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Graceful Degradation with Condition- and Inference-Awareness for Mixed-Criticality Scheduling in Autonomous Systems

Published: 09 May 2023 Publication History

Abstract

In an autonomous system, understanding functional causality is crucial when designing a shared resource scheduling strategy. Without this, the system would be unlikely to achieve a holistic functional quality of service (QoS) and may not meet safety goals. This work proposes a novel graceful degradation strategy in a mixed-criticality context. Instead of discarding computational load at the application level, a qualitative and quantitative definition of importance order is used to assist in realizing finer-grained task-level degradation and preserve more LO-criticality tasks. The causality analysis-based degradation bridges the gap where functional dependencies are not considered in the scheduling design and, thus, leads to the system being able to continue to run with relatively high QoS during the degradation process.

References

[1]
2010. AUTOSAR specification of operating system. http://www.autosar.org/, AUTOSAR.
[2]
2011. ISO 26262 Road Vehicles – Functional Safety. International Organization for Standardization, Geneva, CH, Standard.
[3]
Ankur Ankan and Abinash Panda. 2015. pgmpy: Probabilistic graphical models using python. In Proceedings of the 14th Python in Science Conference (SCIPY 2015). Citeseer.
[4]
Neil C Audsley. 1991. Optimal priority assignment and feasibility of static priority tasks with arbitrary start times. Citeseer.
[5]
Sanjoy K Baruah, Alan Burns, and Robert I Davis. 2011. Response-time analysis for mixed criticality systems. In 2011 IEEE 32nd Real-Time Systems Symposium. IEEE, 34–43.
[6]
Alan Burns and Robert Davis. 2013. Mixed criticality systems-a review. Department of Computer Science, University of York, Tech. Rep (2013), 1–69.
[7]
Alan Burns, Robert I Davis, Sanjoy Baruah, and Iain Bate. 2018. Robust mixed-criticality systems. IEEE Trans. Comput. 67, 10 (2018), 1478–1491.
[8]
Paul Emberson and Iain Bate. 2008. Extending a task allocation algorithm for graceful degradation of real-time distributed embedded systems. In 2008 Real-Time Systems Symposium. IEEE, 270–279.
[9]
Paul Emberson, Roger Stafford, and Robert I Davis. 2010. Techniques for the synthesis of multiprocessor tasksets. In proceedings 1st International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS 2010). 6–11.
[10]
Tom Fleming and Alan Burns. 2014. Incorporating the notion of importance into mixed criticality systems. In Proc. 2nd Workshop on Mixed Criticality Systems (WMC), RTSS. 33–38.
[11]
Xiaozhe Gu and Arvind Easwaran. 2016. Dynamic budget management with service guarantees for mixed-criticality systems. In 2016 IEEE Real-Time Systems Symposium (RTSS). IEEE, 47–56.
[12]
Stefan Holzknecht, Erwin Biebl, and Hans-Ulrich Michel. 2009. Graceful degradation for driver assistance systems. In Advanced Microsystems for Automotive Applications 2009. Springer, 255–265.
[13]
Tasuku Ishigooka, Satoshi Otsuka, Kazuyoshi Serizawa, Ryo Tsuchiya, and Fumio Narisawa. 2019. Graceful degradation design process for autonomous driving system. In International Conference on Computer Safety, Reliability, and Security. Springer, 19–34.
[14]
Zhe Jiang, Shuai Zhao, Ran Wei, Dawei Yang, Richard Paterson, Nan Guan, Yan Zhuang, and Neil Audsly. 2021. Bridging the Pragmatic Gaps for Mixed-Criticality Systems in the Automotive Industry. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2021).
[15]
Uffe B Kjærulff and Anders L Madsen. 2005. Probabilistic networks-an introduction to bayesian networks and influence diagrams. Aalborg University (2005), 10–31.
[16]
John Alexander McDermid, Yan Jia, and Ibrahim Habli. 2019. Towards a framework for safety assurance of autonomous systems. In Artificial Intelligence Safety 2019. CEUR Workshop Proceedings, 1–7.
[17]
Jan Reich, Marc Wellstein, Ioannis Sorokos, Fabian Oboril, and Kay-Ulrich Scholl. 2021. Towards a Software Component to Perform Situation-Aware Dynamic Risk Assessment for Autonomous Vehicles. In European Dependable Computing Conference. Springer, 3–11.
[18]
Paolo Trucco, Enrico Cagno, Fabrizio Ruggeri, and Ottavio Grande. 2008. A Bayesian Belief Network modelling of organisational factors in risk analysis: A case study in maritime transportation. Reliability Engineering & System Safety 93, 6 (2008), 845–856.
[19]
Steve Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In 28th IEEE International Real-Time Systems Symposium (RTSS 2007). IEEE, 239–243.
[20]
Shuai Zhao, Xiaotian Dai, Iain Bate, Alan Burns, and Wanli Chang. 2020. DAG scheduling and analysis on multiprocessor systems: Exploitation of parallelism and dependency. In 2020 IEEE Real-Time Systems Symposium (RTSS). IEEE, 128–140.

Cited By

View all
  • (2023)IoT Device Lifecycle Management2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00253(1865-1870)Online publication date: 1-Nov-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CPS-IoT Week '23: Proceedings of Cyber-Physical Systems and Internet of Things Week 2023
May 2023
419 pages
ISBN:9798400700491
DOI:10.1145/3576914
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 May 2023

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CPS-IoT Week '23
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)IoT Device Lifecycle Management2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00253(1865-1870)Online publication date: 1-Nov-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media