Regular specifications of resource requirements for embedded control software

Rajeev Alur, Gera Weiss

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

33 Scopus citations

Abstract

For embedded control systems, a schedule for the allocation of resources to a software component can be described by an infinite word whose ith symbol models the resources used at the ith sampling interval. Dependency of performance on schedules can be formally modeled by an automaton (w-regular language) which captures all the schedules that keep the system within performance requirements. We show how such an automaton is constructed for linear control designs and exponential stability or settling time performance requirements. Then, we explore the use of the automaton for online scheduling and for schedulability analysis. As a case study, we examine how this approach can be applied for the LQG control design. We demonstrate, by examples, that online schedulers can be used to guarantee performance in worst-case condition together with good performance in normal conditions. We also provide examples of schedulability analysis.

Original languageEnglish
Title of host publicationProceedings of the 14th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2008
Pages159-168
Number of pages10
DOIs
StatePublished - 12 Sep 2008
Externally publishedYes
Event14th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2008 - St. Louis, MO, United States
Duration: 22 Apr 200824 Apr 2008

Publication series

NameProceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS
ISSN (Print)1545-3421

Conference

Conference14th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2008
Country/TerritoryUnited States
CitySt. Louis, MO
Period22/04/0824/04/08

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Regular specifications of resource requirements for embedded control software'. Together they form a unique fingerprint.

Cite this