{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:16:47Z","timestamp":1767651407535,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031453281"},{"type":"electronic","value":"9783031453298"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45329-8_15","type":"book-chapter","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T18:02:40Z","timestamp":1697911360000},"page":"312-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Statistical Approach to\u00a0Efficient and\u00a0Deterministic Schedule Synthesis for\u00a0Cyber-Physical Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1784-1386","authenticated-orcid":false,"given":"Shengjie","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-2803","authenticated-orcid":false,"given":"Bineet","family":"Ghosh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6046-9511","authenticated-orcid":false,"given":"Clara","family":"Hobbs","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9739-6501","authenticated-orcid":false,"given":"Enrico","family":"Fraccaroli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8871-0298","authenticated-orcid":false,"given":"Parasara Sridhar","family":"Duggirala","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0503-6235","authenticated-orcid":false,"given":"Samarjit","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,22]]},"reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/12.919277","volume":"50","author":"G Bernat","year":"2001","unstructured":"Bernat, G., Burns, A., Liamosi, A.: Weakly hard real-time systems. IEEE Trans. Comput. 50(4), 308\u2013321 (2001)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1137\/141000671","volume":"59","author":"J Bezanson","year":"2017","unstructured":"Bezanson, J., Edelman, A., Karpinski, S., Shah, V.B.: Julia: a fresh approach to numerical computing. SIAM Rev. 59(1), 65\u201398 (2017)","journal-title":"SIAM Rev."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Bordoloi, U.D., Chakraborty, S., Jochim, M., Joshi, P., Raghuraman, A., Ramesh, S.: Autonomy-driven emerging directions in software-defined vehicles. In: Design, Automation & Test in Europe Conference & Exhibition (DATE) (2023)","DOI":"10.23919\/DATE56975.2023.10136910"},{"key":"15_CR4","unstructured":"von der Br\u00fcggen, G., et al.: Efficiently approximating the probability of deadline misses in real-time systems. In: Euromicro Conference on Real-Time Systems. ECRTS (2018)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/3-540-44634-6_5","volume-title":"Algorithms and Data Structures","author":"S Chakraborty","year":"2001","unstructured":"Chakraborty, S., Erlebach, T., Thiele, L.: On the complexity of scheduling conditional real-time code. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 38\u201349. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44634-6_5"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MDAT.2016.2573598","volume":"33","author":"S Chakraborty","year":"2016","unstructured":"Chakraborty, S., et al.: Automotive cyber-physical systems: a tutorial introduction. IEEE Des. Test 33(4), 92\u2013108 (2016)","journal-title":"IEEE Des. Test"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1561\/1000000045","volume":"10","author":"W Chang","year":"2016","unstructured":"Chang, W., Chakraborty, S.: Resource-aware automotive control systems design: a cyber-physical systems approach. Found. Trends Electron. Des. Autom. 10(4), 249\u2013369 (2016)","journal-title":"Found. Trends Electron. Des. Autom."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Duggirala, P.S., Viswanathan, M.: Analyzing real time linear control systems using software verification. In: IEEE Real-Time Systems Symposium (RTSS) (2015)","DOI":"10.1109\/RTSS.2015.28"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Fraccaroli, E., Joshi, P., Xu, S., Shazzad, K., Jochim, M., Chakraborty, S.: Timing predictability for SOME\/IP-based service-oriented automotive in-vehicle networks. In: Design, Automation & Test in Europe Conference & Exhibition (DATE) (2023)","DOI":"10.23919\/DATE56975.2023.10137065"},{"key":"15_CR10","volume-title":"Signals and Linear Systems","author":"RA Gabel","year":"1987","unstructured":"Gabel, R.A., Roberts, R.A.: Signals and Linear Systems. Wiley, Hoboken (1987)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Georgakos, G., et al.: Reliability challenges for electric vehicles: from devices to architecture and systems software. In: 50th Annual Design Automation Conference (DAC) (2013)","DOI":"10.1145\/2463209.2488855"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Ghosh, B., et al.: Statistical hypothesis testing of controller implementations under timing uncertainties. In: 28th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA) (2022)","DOI":"10.1109\/RTCSA55878.2022.00008"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Goswami, D., Lukasiewycz, M., Schneider, R., Chakraborty, S.: Time-triggered implementations of mixed-criticality automotive software. In: Design, Automation & Test in Europe Conference & Exhibition (DATE) (2012)","DOI":"10.1109\/DATE.2012.6176680"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Goswami, D., Schneider, R., Chakraborty, S.: Re-engineering cyber-physical control applications for hybrid communication protocols. In: Design, Automation and Test in Europe (DATE) (2011)","DOI":"10.1109\/DATE.2011.5763148"},{"issue":"12","key":"15_CR15","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/12.477249","volume":"44","author":"M Hamdaoui","year":"1995","unstructured":"Hamdaoui, M., Ramanathan, P.: A dynamic priority assignment technique for streams with (m, k)-firm deadlines. IEEE Trans. Comput. 44(12), 1443\u20131451 (1995)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Hammadeh, Z., Ernst, R., Quinton, S., Henia, R., Rioux, L.: Bounding deadline misses in weakly-hard real-time systems with task dependencies. In: Design, Automation & Test in Europe Conference & Exhibition (DATE) (2017)","DOI":"10.23919\/DATE.2017.7927054"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Hobbs, C., Ghosh, B., Xu, S., Duggirala, P.S., Chakraborty, S.: Safety analysis of embedded controllers under implementation platform timing uncertainties. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 41(11), 4016\u20134027 (2022)","DOI":"10.1109\/TCAD.2022.3198905"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-030-53288-8_26","volume-title":"Computer Aided Verification","author":"C Huang","year":"2020","unstructured":"Huang, C., Chang, K.-C., Lin, C.-W., Zhu, Q.: SAW: a tool for safety analysis of weakly-hard systems. In: Lahiri, S.K., Wang, C. (eds.) CAV 2020. LNCS, vol. 12224, pp. 543\u2013555. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-53288-8_26"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Huang, C., Li, W., Zhu, Q.: Formal verification of weakly-hard systems. In: 22nd ACM International Conference on Hybrid Systems: Computation and Control (HSCC) (2019)","DOI":"10.1145\/3302504.3311811"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Ju, L., Huynh, B.K., Roychoudhury, A., Chakraborty, S.: Timing analysis of Esterel programs on general-purpose multiprocessors. In: 47th Design Automation Conference (DAC) (2010)","DOI":"10.1145\/1837274.1837288"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Ju, L., et al.: Context-sensitive timing analysis of Esterel programs. In: 46th Design Automation Conference (DAC) (2009)","DOI":"10.1145\/1629911.1630132"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Kumar, P., Goswami, D., Chakraborty, S., Annaswamy, A., Lampka, K., Thiele, L.: A hybrid approach to cyber-physical systems verification. In: The 49th Annual Design Automation Conference (DAC) (2012)","DOI":"10.1145\/2228360.2228484"},{"key":"15_CR23","unstructured":"Maggio, M., Hamann, A., Mayer-John, E., Ziegenbein, D.: Control-system stability under consecutive deadline misses constraints. In: 32nd Euromicro Conference on Real-Time Systems (ECRTS) (2020)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Saha, I., Zamani, M.: Synthesis of minimal-error control software. In: 12th International Conference on Embedded Software (EMSOFT) (2012)","DOI":"10.1145\/2380356.2380380"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Masrur, A., et al.: VM-based real-time services for automotive control applications. In: 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA) (2010)","DOI":"10.1109\/RTCSA.2010.38"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Mundhenk, P., et al.: Security analysis of automotive architectures using probabilistic model checking. In: 52nd Annual Design Automation Conference (DAC) (2015)","DOI":"10.1145\/2744769.2744906"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Osman, K., Rahmat, M.F., Ahmad, M.A.: Modelling and controller design for a cruise control system. In: 5th International Colloquium on Signal Processing & Its Applications (2009)","DOI":"10.1109\/CSPA.2009.5069228"},{"key":"15_CR28","unstructured":"O\u2019Kelly, M., Zheng, H., Karthik, D., Mangharam, R.: F1TENTH: an open-source evaluation environment for continuous control and reinforcement learning. In: Proceedings of the NeurIPS 2019 Competition and Demonstration Track. PMLR (2020). https:\/\/proceedings.mlr.press\/v123\/o-kelly20a.html"},{"key":"15_CR29","unstructured":"Parisotto, E., Mohamed, A.R., Singh, R., Li, L., Zhou, D., Kohli, P.: Neuro-symbolic program synthesis. arXiv preprint arXiv:1611.01855 (2016)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Pazzaglia, P., et al.: Adaptive design of real-time control systems subject to sporadic overruns. In: Design Automation and Test in Europe (DATE) (2021)","DOI":"10.23919\/DATE51398.2021.9473913"},{"key":"15_CR31","unstructured":"Pazzaglia, P., Mandrioli, C., Maggio, M., Cervin, A.: DMAC: deadline-miss-aware control. In: Euromicro Conference on Real-Time Systems (ECRTS) (2019)"},{"issue":"1","key":"15_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3404888","volume":"20","author":"P Pazzaglia","year":"2020","unstructured":"Pazzaglia, P., Sun, Y., Natale, M.D.: Generalized weakly hard schedulability analysis for real-time periodic tasks. ACM Trans. Embed. Comput. Syst. 20(1), 1\u201326 (2020). https:\/\/doi.org\/10.1145\/3404888","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Roy, D., Zhang, L., Chang, W., Goswami, D., Chakraborty, S.: Multi-objective co-optimization of FlexRay-based distributed control systems. In: IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) (2016)","DOI":"10.1109\/RTAS.2016.7461344"},{"issue":"1","key":"15_CR34","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/2490301.2451150","volume":"41","author":"E Schkufza","year":"2013","unstructured":"Schkufza, E., Sharma, R., Aiken, A.: Stochastic superoptimization. ACM SIGARCH Comput. Archit. News 41(1), 305\u2013316 (2013)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Schneider, R., Goswami, D., Zafar, S., Chakraborty, S., Lukasiewycz, M.: Constraint-driven synthesis and tool-support for FlexRay-based automotive control systems. In: 2011 Proceedings of the Ninth IEEE\/ACM\/IFIP International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS) (2011)","DOI":"10.1145\/2039370.2039394"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Schneider, R., et al.: Multi-layered scheduling of mixed-criticality cyber-physical systems. J. Syst. Archit. 59(10-D), 1215\u20131230 (2013)","DOI":"10.1016\/j.sysarc.2013.09.003"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Tibba, G., Malz, C., Stoermer, C., Nagarajan, N., Zhang, L., Chakraborty, S.: Testing automotive embedded systems under X-in-the-loop setups. In: 35th International Conference on Computer-Aided Design (ICCAD) (2016)","DOI":"10.1145\/2966986.2980076"},{"key":"15_CR38","unstructured":"Tilbury, D., Messner, B.: Control Tutorials for MATLAB and Simulink. https:\/\/ctms.engin.umich.edu\/CTMS\/index.php?aux=Home"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Vreman, N., Pates, R., Maggio, M.: WeaklyHard.jl: scalable analysis of weakly-hard constraints. In: 28th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) (2022)","DOI":"10.1109\/RTAS54340.2022.00026"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Waszecki, P., et al.: Automotive electrical and electronic architecture security via distributed in-vehicle traffic monitoring. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 36(11), 1790\u20131803 (2017)","DOI":"10.1109\/TCAD.2017.2666605"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Xu, S., Ghosh, B., Hobbs, C., Thiagarajan, P.S., Chakraborty, S.: Safety-aware flexible schedule synthesis for cyber-physical systems using weakly-hard constraints. In: 28th Asia and South Pacific Design Automation Conference (ASP-DAC) (2023)","DOI":"10.1145\/3566097.3567848"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, L., Goswami, D., Schneider, R., Chakraborty, S.: Task-and network-level schedule co-synthesis of ethernet-based time-triggered systems. In: 19th Asia and South Pacific Design Automation Conference (ASP-DAC) (2014)","DOI":"10.1109\/ASPDAC.2014.6742876"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45329-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T18:04:43Z","timestamp":1697911483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45329-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031453281","9783031453298"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45329-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Automated Technology for Verification and Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atva2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/atva-conference.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7 tool papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}