Execution time distributions in embedded safety-critical systems using extreme value theory

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Upper-bounding Program Execution Time with Extreme Value Theory

In this paper we discuss the limitations of and the precautions to account for when using Extreme Value Theory (EVT) to compute upper bounds to the execution time of programs. We analyse the requirements placed by EVT on the observations to be made of the events of interest, and the conditions that render safe the computations of execution time upper bounds. We also study the requirements that ...

متن کامل

Intrusion Detection Using Execution Contexts Learned from System Call Distributions of Real-Time Embedded Systems

The increasing number of security threats faced by real-time embedded systems requires the development of effective intrusion detection mechanisms. However, the limited resources in such systems, viz., computational power and storage, prevent current techniques from being effective. In this paper, we propose a lightweight method with a deterministic time complexity for detecting anomalous execu...

متن کامل

On Using Extreme Value Theory in Response-Time Analysis of Priority-Driven Periodic Real-Time Systems

In this paper we present work toward using our previously proposed method RapidRT to perform response-time analysis of periodic real-time systems, where the execution time of the adhering tasks is a random variable from a known distribution. In effect, we not only aim at validating the potential of considering the results given by RapidRT as upper bounds on tasks’ worst-case response time estim...

متن کامل

Coordination of Safety-Critical Mobile Real-Time Embedded Systems

Safety-critical mobile applications running on resource-constrained embedded systems will play an increasingly important role in domains such as automotive systems, space, robotics and avionics. Such applications are composed of mobile autonomous components interacting spontaneously without any infrastructure. Therefore, to undertake safety-critical missions, the applications will have to coord...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Data Analysis Techniques and Strategies

سال: 2017

ISSN: 1755-8050,1755-8069

DOI: 10.1504/ijdats.2017.10009428