{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:34:33Z","timestamp":1766050473641,"version":"3.37.3"},"reference-count":84,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100007195","name":"Universit\u00e0 degli Studi di Napoli Federico II","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100007195","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Real-Time Syst"],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Technological advances in embedded systems and the advent of fog computing led to improved quality of service of applications of cyber-physical systems. In fact, the deployment of such applications on powerful and heterogeneous embedded systems, such as multiprocessors system-on-chips (MPSoCs), allows them to meet latency requirements and real-time operation. Highly relevant to the industry and our reference case-study, the challenging field of nuclear fusion deploys the aforementioned applications, involving high-frequency control with hard real-time and safety constraints. The use of fog computing and MPSoCs is promising to achieve safety, low latency, and timeliness of such control. Indeed, on one hand, applications designed according to fog computing distribute computation across hierarchically organized and geographically distributed edge devices, enabling timely anomaly detection during high-frequency sampling of time series, and, on the other hand, MPSoCs allow leveraging fog computing and integrating monitoring by deploying tasks on a flexible platform suited for mixed-criticality software, leading to so-called mixed criticality systems (MCSs). However, the integration of such software on the same MPSoC opens challenges related to predictability and reliability guarantees, as tasks interfering with each other when accessing the same shared MPSoC resources may introduce non-deterministic latency, possibly leading to failures on account of deadline overruns. Addressing the design, deployment, and evaluation of MCSs on MPSoCs, we propose a model-based system development process that facilitates the integration of real-time and monitoring software on the same platform by means of a formal notation for modeling the design and deployment of MPSoCs. The proposed notation allows developers to leverage embedded hypervisors for monitoring real-time applications and guaranteeing predictability by isolation of hardware resources. Providing evidence of the feasibility of our system development process and evaluating the industry-relevant class of nuclear fusion applications, we experiment with a safety-critical case-study in the context of the ITER nuclear fusion reactor. Our experimentation involves the design and evaluation of several prototypes deployed as MCSs on a virtualized MPSoC, showing that deployment choices linked to the monitor placement and virtualization configurations (e.g., resource allocation, partitioning, and scheduling policies) can significantly impact the predictability of MCSs in terms of Worst-Case Execution Times and other related metrics.\n<\/jats:p>","DOI":"10.1007\/s11241-023-09410-4","type":"journal-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T14:02:46Z","timestamp":1698847366000},"page":"534-567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating virtualization for fog monitoring of real-time applications in mixed-criticality systems"],"prefix":"10.1007","volume":"59","author":[{"given":"Marcello","family":"Cinque","sequence":"first","affiliation":[]},{"given":"Luigi","family":"De Simone","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Ottaviano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2325-0056","authenticated-orcid":false,"given":"Francesco","family":"Vitale","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"key":"9410_CR1","unstructured":"AEEC (2010) ARINC-653: Avionics application Software standard interface part 1. Technical report"},{"key":"9410_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal A, Mancuso R, Pellizzoni R, Fohler G (2018) Analysis of dynamic memory bandwidth regulation in multi-core real-time systems. In: 2018 IEEE real-time systems symposium (RTSS), IEEE, pp. 230\u2013241","DOI":"10.1109\/RTSS.2018.00040"},{"issue":"11","key":"9410_CR3","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.3390\/en14113322","volume":"14","author":"S Alonso","year":"2021","unstructured":"Alonso S, L\u00e1zaro J, Jim\u00e9nez J, Bidarte U, Muguira L (2021) Evaluating latency in multiprocessing embedded systems for the smart grid. Energies 14(11):3322","journal-title":"Energies"},{"issue":"2","key":"9410_CR4","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TCST.2010.2042601","volume":"19","author":"G Ambrosino","year":"2010","unstructured":"Ambrosino G, Ariola M, De Tommasi G, Pironti A (2010) Plasma vertical stabilization in the ITER tokamak via constrained static output feedback. IEEE Trans Control Syst Technol 19(2):376\u2013381","journal-title":"IEEE Trans Control Syst Technol"},{"key":"9410_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29890-0","volume-title":"Magnetic control of Tokamak plasmas","author":"M Ariola","year":"2016","unstructured":"Ariola M, Pironti A (2016) Magnetic control of Tokamak plasmas, 2nd edn. Springer, London","edition":"2"},{"key":"9410_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie J-C, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1:11\u201333","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"9410_CR7","unstructured":"Avnet I Top 6 Autonomous Vehicle Use Cases You Need to Read (White Paper). https:\/\/www.avnet.com\/wps\/wcm\/connect\/onesite\/5e738e6a-a181-46b0-b49b-941ce36fed98\/Xilinx-Automotive-eBook-APAC-Eng.pdf?MOD=AJPERES &CVID=na56dje &attachment=false &id=1591370911158"},{"key":"9410_CR8","doi-asserted-by":"crossref","unstructured":"Avon G, Buscarino A, Neto AC, Sartori F (2021) Marte2 embedded signal processing unit for the iter magnetics diagnostics. In: IECON 2021\u201347th annual conference of the IEEE industrial electronics society, IEEE, pp. 1\u20136","DOI":"10.1109\/IECON48115.2021.9589325"},{"key":"9410_CR9","doi-asserted-by":"publisher","first-page":"3162","DOI":"10.1109\/TNS.2011.2167350","volume":"58","author":"A Barbalace","year":"2011","unstructured":"Barbalace A, Manduchi G, Neto A, De Tommasi G, Sartori F, Valcarcel DF (2011) Performance comparison of EPICS IOC and MARTe in a hard real-time control application. IEEE Trans Nucl Sci 58:3162\u20133166","journal-title":"IEEE Trans Nucl Sci"},{"key":"9410_CR10","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P Barham","year":"2003","unstructured":"Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A (2003) Xen and the art of virtualization. ACM SIGOPS Oper Syst Rev 37:164\u2013177","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"9410_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.pmcj.2018.12.007","volume":"52","author":"P Bellavista","year":"2019","unstructured":"Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the internet of things. Pervasive Mob Comput 52:71\u201399","journal-title":"Pervasive Mob Comput"},{"key":"9410_CR12","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.scico.2016.09.002","volume":"133","author":"M Benerecetti","year":"2017","unstructured":"Benerecetti M, De Guglielmo R, Gentile U, Marrone S, Mazzocca N, Nardone R, Peron A, Velardi L, Vittorini V (2017) Dynamic state machines for modelling railway control systems. Sci Comput Program 133:116\u2013153","journal-title":"Sci Comput Program"},{"issue":"5","key":"9410_CR13","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/TC.2015.2444833","volume":"65","author":"A Biondi","year":"2015","unstructured":"Biondi A, Buttazzo GC, Bertogna M (2015) Schedulability analysis of hierarchical real-time systems under shared resources. IEEE Trans Comput 65(5):1593\u20131605","journal-title":"IEEE Trans Comput"},{"key":"9410_CR14","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.iot.2018.09.005","volume":"3","author":"L Bittencourt","year":"2018","unstructured":"Bittencourt L, Immich R, Sakellariou R, Fonseca N, Madeira E, Curado M, Villas L, DaSilva L, Lee C, Rana O (2018) The internet of things, fog and cloud continuum: integration and challenges. Internet of Things 3:134\u2013155","journal-title":"Internet of Things"},{"issue":"17","key":"9410_CR15","doi-asserted-by":"publisher","first-page":"2676","DOI":"10.3390\/electronics11172676","volume":"11","author":"J Bzai","year":"2022","unstructured":"Bzai J, Alam F, Dhafer A, Bojovic M, Altowaijri SM, Niazi IK, Mehmood R (2022) Machine learning-enabled internet of things (IoT): data, applications, and industry perspective. Electronics 11(17):2676","journal-title":"Electronics"},{"key":"9410_CR16","unstructured":"CENELEC (2011) EN 50128. Technical report"},{"issue":"3","key":"9410_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1\u201358","journal-title":"ACM Comput Surv"},{"key":"9410_CR18","doi-asserted-by":"crossref","unstructured":"Chardet M, Coullon H, Pertin D, Perez C (2018) Madeus: a formal deployment model. In: 2018 international conference on high performance computing & simulation (HPCS), pp. 724\u2013731","DOI":"10.1109\/HPCS.2018.00118"},{"issue":"10","key":"9410_CR19","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MC.2022.3140896","volume":"55","author":"A Cilardo","year":"2022","unstructured":"Cilardo A, Cinque M, De Simone L, Mazzocca N (2022) Virtualization over multiprocessor systems-on-chip: an enabling paradigm for the industrial Internet of Things. Computer 55(10):35\u201347","journal-title":"Computer"},{"key":"9410_CR20","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.future.2021.12.002","volume":"129","author":"M Cinque","year":"2021","unstructured":"Cinque M, Cotroneo D, De Simone L, Rosiello S (2021) Virtualizing mixed-criticality systems: a survey on industrial trends and issues. Future Gener Comput Syst 129:315\u2013330","journal-title":"Future Gener Comput Syst"},{"key":"9410_CR21","unstructured":"Commission, I.E (1998) Software requirements. Technical report"},{"key":"9410_CR22","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comnet.2022.109189","volume":"215","author":"B Costa","year":"2022","unstructured":"Costa B, Bachiega J, Carvalho LR, Rosa M, Araujo A (2022) Monitoring fog computing: a review, taxonomy and open challenges. Comput Netw 215:109\u2013189","journal-title":"Comput Netw"},{"key":"9410_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2021.102307","volume":"106","author":"D Cotroneo","year":"2021","unstructured":"Cotroneo D, De Simone L, Natella R (2021) Timing covert channel analysis of the vxworks mils embedded hypervisor under the common criteria security certification. Comput Secur 106:1\u201313","journal-title":"Comput Secur"},{"key":"9410_CR24","volume-title":"Distributed systems: concepts and design","author":"GF Coulouris","year":"2011","unstructured":"Coulouris GF, Dollimore J, Kindberg T (2011) Distributed systems: concepts and design, 5th edn. Pearson, Boston","edition":"5"},{"key":"9410_CR25","doi-asserted-by":"publisher","first-page":"120936","DOI":"10.1109\/ACCESS.2022.3222387","volume":"10","author":"P De Saqui-Sannes","year":"2022","unstructured":"De Saqui-Sannes P, Vingerhoeds RA, Garion C, Thirioux X (2022) A taxonomy of MBSE approaches by languages, tools and methods. IEEE Access 10:120936\u2013120950","journal-title":"IEEE Access"},{"key":"9410_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.fusengdes.2022.113317","volume":"185","author":"G De Tommasi","year":"2022","unstructured":"De Tommasi G (2022) System-Engineering approach for the ITER PCS design: the correction coils current controller case study. Fusion Eng Des 185:1\u20136","journal-title":"Fusion Eng Des"},{"key":"9410_CR27","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.fusengdes.2013.06.010","volume":"89","author":"G De Tommasi","year":"2014","unstructured":"De Tommasi G, Maviglia F, Neto A, Lomas P, McCullen P, Rimini FG (2014) Plasma position and current control system enhancements for the JET ITER-like wall. Fusion Eng Des 89:233\u2013242","journal-title":"Fusion Eng Des"},{"issue":"12","key":"9410_CR28","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TSE.2004.91","volume":"30","author":"N Delgado","year":"2004","unstructured":"Delgado N, Gates AQ, Roach S (2004) A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Trans Software Eng 30(12):859\u2013872","journal-title":"IEEE Trans Software Eng"},{"key":"9410_CR29","doi-asserted-by":"crossref","unstructured":"Ding K, Ding S, Morozov A, Fabarisov T, Janschek K (2019) On-line error detection and mitigation for time-series data of cyber-physical systems using deep learning based methods. In: 2019 15th European Dependable Computing Conference (EDCC), pp. 7\u201314","DOI":"10.1109\/EDCC.2019.00015"},{"key":"9410_CR30","doi-asserted-by":"crossref","unstructured":"Dong X, Jin B, Tang B, Tang H (2018) On real-time monitoring on data stream for traffic flow anomalies. In: 2018 IEEE International conference on parallel & distributed processing with applications, ubiquitous computing & communications, big data & cloud computing, social computing & networking, sustainable computing & communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom), pp. 322\u2013329","DOI":"10.1109\/BDCloud.2018.00058"},{"key":"9410_CR31","doi-asserted-by":"publisher","first-page":"100203","DOI":"10.1016\/j.ifacsc.2022.100203","volume":"21","author":"S Dubbioso","year":"2022","unstructured":"Dubbioso S (2022) Vertical stabilization of tokamak plasmas via extremum seeking. IFAC J Syst Control 21:100203","journal-title":"IFAC J Syst Control"},{"key":"9410_CR32","unstructured":"EUROfusion (2018) European Research Roadmap to the Realisation of Fusion Energy. https:\/\/www.euro-fusion.org\/fileadmin\/user_upload\/EUROfusion\/Documents\/2018_Research_roadmap_long_version_01.pdf, Accessed November 2022"},{"key":"9410_CR33","unstructured":"Goodloe A, Pike L (2010) Monitoring distributed real-time systems: a survey and future directions. Technical report, NASA Langley Research Center"},{"key":"9410_CR34","unstructured":"Hassan M, Pellizzoni R (2020) Analysis of memory-contention in heterogeneous cots mpsocs. In: 32nd Euromicro conference on real-time Systems (ECRTS 2020). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik"},{"key":"9410_CR35","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/iet-sen.2013.0236","volume":"8","author":"D Heffernan","year":"2014","unstructured":"Heffernan D, MacNamee C, Fogarty P (2014) Runtime verification monitoring for automotive embedded systems using the ISO 26262 functional safety standard as a guide for the definition of the monitored properties. IET Softw 8:193\u2013203","journal-title":"IET Softw"},{"key":"9410_CR36","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TNSM.2020.3038172","volume":"18","author":"A Hemmer","year":"2021","unstructured":"Hemmer A, Abderrahim M, Badonnel R, Fran\u00e7ois J, Chrisment I (2021) Comparative Assessment of Process Mining for Supporting IoT Predictive Security. IEEE Trans Netw Serv Manage 18:1092\u20131103","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"9410_CR37","doi-asserted-by":"crossref","unstructured":"Houdek P, Sojka M, Hanz\u00e1lek Z (2017) Towards predictable execution model on arm-based heterogeneous platforms. In: 2017 IEEE 26th international symposium on industrial electronics (ISIE), IEEE, pp. 1297\u20131302","DOI":"10.1109\/ISIE.2017.8001432"},{"key":"9410_CR38","doi-asserted-by":"crossref","unstructured":"Hughes A, Awad A (2019) Quantifying performance determinism in virtualized mixed-criticality systems. In: 2019 IEEE 22nd international symposium on real-time distributed computing (ISORC), pp. 181\u2013184","DOI":"10.1109\/ISORC.2019.00041"},{"key":"9410_CR39","unstructured":"ISO (2011) Product development: software Level. Technical report"},{"key":"9410_CR40","unstructured":"Kadar M, Tverdyshev S, Fohler G (2019) System calls instrumentation for intrusion detection in embedded mixed-criticality systems. In: 4th international workshop on security and dependability of critical embedded real-time systems (CERTS 2019)"},{"key":"9410_CR41","doi-asserted-by":"crossref","unstructured":"Kao CH (2020) Survey on evaluation of IoT services leveraging virtualization technology. In: Proceedings 2020 5th international conference on cloud computing and Internet of Things, pp. 26\u201334","DOI":"10.1145\/3429523.3429524"},{"key":"9410_CR42","unstructured":"Kivity A, Kamay Y, Laor D, Lublin U, Liguori A (2007) kvm: the Linux virtual machine monitor. In: Proceedings of the Linux symposium, vol. 1, pp. 225\u2013230"},{"key":"9410_CR43","doi-asserted-by":"crossref","unstructured":"Klein G, Elphinstone K, Heiser G, Andronick J, Cock D, Derrin P, Elkaduwe D, Engelhardt K, Kolanski R, Norrish M (2009) seL4: Formal verification of an OS kernel. In: Symposium on operating systems principles, pp. 207\u2013220","DOI":"10.1145\/1629575.1629596"},{"key":"9410_CR44","doi-asserted-by":"crossref","unstructured":"Kloda T, Solieri M, Mancuso R, Capodieci N, Valente P, Bertogna M (2019) Deterministic memory hierarchy and virtualization for modern multi-core embedded systems. In: 2019 IEEE real-time and embedded technology and applications symposium (RTAS), IEEE, pp. 1\u201314","DOI":"10.1109\/RTAS.2019.00009"},{"key":"9410_CR45","volume-title":"Distributed computing: principles, algorithms, and systems","author":"AD Kshemkalyani","year":"2011","unstructured":"Kshemkalyani AD, Singhal M (2011) Distributed computing: principles, algorithms, and systems. Cambridge University Press, Cambridge"},{"key":"9410_CR46","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.future.2017.06.002","volume":"79","author":"A Kumara","year":"2018","unstructured":"Kumara A, Jaidhar C (2018) Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM. Future Gener Comput Syst 79:431\u2013446","journal-title":"Future Gener Comput Syst"},{"key":"9410_CR47","doi-asserted-by":"crossref","unstructured":"Kwon D, Oh K, Park J, Yang S, Cho Y, Kang BB, Paek Y (2018) Hypernel: a hardware-assisted framework for kernel protection without nested paging. In: Proceedings of the 55th annual design automation conference, pp. 1\u20136","DOI":"10.1145\/3195970.3196061"},{"key":"9410_CR48","doi-asserted-by":"crossref","unstructured":"Lee J, Xi S, Chen S, Phan LT, Gill C, Lee I, Lu C, Sokolsky O (2012) Realizing compositional scheduling through virtualization. In: 2012 IEEE 18th real time and embedded technology and applications symposium, IEEE, pp. 13\u201322","DOI":"10.1109\/RTAS.2012.20"},{"issue":"3","key":"9410_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3323212","volume":"52","author":"C Maiza","year":"2019","unstructured":"Maiza C, Rihani H, Rivas JM, Goossens J, Altmeyer S, Davis RI (2019) A survey of timing verification techniques for multi-core real-time systems. ACM Comput Surv (CSUR) 52(3):1\u201338","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9410_CR50","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10009-019-00513-7","volume":"22","author":"H Mkaouar","year":"2020","unstructured":"Mkaouar H, Zalila B, Hugues J, Jmaiel M (2020) A formal approach to AADL model-based software engineering. Int J Softw Tools Technol Transf 22:219\u2013247","journal-title":"Int J Softw Tools Technol Transf"},{"key":"9410_CR51","doi-asserted-by":"crossref","unstructured":"Modica P, Biondi A, Buttazzo G, Patel A (2018) Supporting temporal and spatial isolation in a hypervisor for arm multicore platforms. In: 2018 IEEE international conference on industrial technology (ICIT), IEEE, pp. 1651\u20131657","DOI":"10.1109\/ICIT.2018.8352429"},{"key":"9410_CR52","first-page":"20","volume":"10","author":"J Molka-Danielsen","year":"2015","unstructured":"Molka-Danielsen J, Engelseth P, Wang H (2015) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20\u201328","journal-title":"J Ind Inf Integr"},{"issue":"5","key":"9410_CR53","doi-asserted-by":"publisher","first-page":"056002","DOI":"10.1088\/1741-4326\/aaaf9c","volume":"58","author":"A Murari","year":"2018","unstructured":"Murari A (2018) Adaptive predictors based on probabilistic SVM for real time disruption mitigation on JET. Nucl Fusion 58(5):056002","journal-title":"Nucl Fusion"},{"key":"9410_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102154","volume":"105","author":"H Naeem","year":"2020","unstructured":"Naeem H, Ullah F, Naeem MR, Khalid S, Vasan D, Jabbar S, Saeed S (2020) Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Netw 105:1\u201312","journal-title":"Ad Hoc Netw"},{"key":"9410_CR55","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TNS.2011.2120622","volume":"58","author":"AC Neto","year":"2011","unstructured":"Neto AC (2011) A survey of recent MARTe based systems. IEEE Trans Nucl Sci 58:1482\u20131489","journal-title":"IEEE Trans Nucl Sci"},{"key":"9410_CR56","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11334-013-0223-x","volume":"9","author":"L Pike","year":"2013","unstructured":"Pike L, Wegmann N, Niller S, Goodloe A (2013) Copilot: monitoring embedded systems. Innov Syst Softw Eng 9:235\u2013255","journal-title":"Innov Syst Softw Eng"},{"key":"9410_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3291047","volume":"51","author":"S Pinto","year":"2019","unstructured":"Pinto S, Santos N (2019) Demystifying arm trustzone: a comprehensive survey. Comput Surv 51:1\u201336","journal-title":"Comput Surv"},{"key":"9410_CR58","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.jmsy.2020.11.017","volume":"58","author":"DGS Pivoto","year":"2021","unstructured":"Pivoto DGS, de Almeida LFF, da Rosa Righi R, Rodrigues JJPC, Lugli AB, Alberti AM (2021) Cyber-physical systems architectures for industrial internet of things applications in industry 4.0: a literature review. J Manufact Syst 58:176\u2013192","journal-title":"J Manufact Syst"},{"key":"9410_CR59","doi-asserted-by":"crossref","unstructured":"Poggi T, Onaindia P, Azkarate-askatsua M, Gr\u00fcttner K, Fakih M, Peir\u00f3 S, Balbastre P (2018) A hypervisor architecture for low-power real-time embedded systems. In: 2018 21st Euromicro conference on digital system design (DSD), pp. 252\u2013259","DOI":"10.1109\/DSD.2018.00054"},{"key":"9410_CR60","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"GJ Popek","year":"1974","unstructured":"Popek GJ, Goldberg RP (1974) Formal requirements for virtualizable third generation architectures. Commun ACM 17:412\u2013421","journal-title":"Commun ACM"},{"issue":"2","key":"9410_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301443","volume":"19","author":"C Puliafito","year":"2019","unstructured":"Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the internet of things: a survey. ACM Trans Internet Technol 19(2):1\u201341","journal-title":"ACM Trans Internet Technol"},{"key":"9410_CR62","doi-asserted-by":"crossref","unstructured":"Quamara M, Pedroza G, Hamid B (2021) Multi-layered model-based design approach towards system safety and security co-engineering. In: 2021 ACM\/IEEE international conference on model driven engineering languages and systems companion (MODELS-C), pp. 274\u2013283","DOI":"10.1109\/MODELS-C53483.2021.00048"},{"key":"9410_CR63","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.fusengdes.2014.04.068","volume":"89","author":"G Raupp","year":"2014","unstructured":"Raupp G (2014) Event generation and simulation of exception handling with the ITER PCSSP. Fusion Eng Des 89:523\u2013528","journal-title":"Fusion Eng Des"},{"key":"9410_CR64","unstructured":"RTCA (2012) DO-178C - Software Considerations in Airborne Systems and Equipment Certification. Technical report"},{"issue":"3","key":"9410_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3539662","volume":"6","author":"JMG S\u00e1nchez","year":"2022","unstructured":"S\u00e1nchez JMG, J\u00f6rgensen N, T\u00f6rngren M, Inam R, Berezovskyi A, Feng L, Fersman E, Ramli MR, Tan K (2022) Edge computing for cyber-physical systems: a systematic mapping study emphasizing trustworthiness. ACM Trans Cyber-Phys Syst 6(3):1\u201328","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"9410_CR66","unstructured":"Siemens AG (2022) Jailhouse. https:\/\/github.com\/siemens\/jailhouse"},{"key":"9410_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10669-022-09859-x","volume":"42","author":"P Singh","year":"2022","unstructured":"Singh P, Saman Azari M, Vitale F, Flammini F, Mazzocca N, Caporuscio M, Thornadtsson J (2022) Using log analytics and process mining to enable self-healing in the Internet of Things. Environ Syst Decis 42:1\u201317","journal-title":"Environ Syst Decis"},{"key":"9410_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1741-4326\/ac2339","volume":"61","author":"J Snipes","year":"2021","unstructured":"Snipes J (2021) ITER plasma control system final design and preparation for first plasma. Nucl Fusion 61:1\u20139","journal-title":"Nucl Fusion"},{"issue":"3","key":"9410_CR69","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11241-022-09382-x","volume":"58","author":"P Sohal","year":"2022","unstructured":"Sohal P, Tabish R, Drepper U, Mancuso R (2022) Profile-driven memory bandwidth management for accelerators and CPUs in QoS-enabled platforms. Real-Time Syst 58(3):235\u2013274","journal-title":"Real-Time Syst"},{"key":"9410_CR70","volume-title":"Software Engineering","author":"I Sommerville","year":"2016","unstructured":"Sommerville I (2016) Software Engineering, 10th edn. Pearson Education Limited, Boston","edition":"10"},{"key":"9410_CR71","unstructured":"Stabellini S (2014) Xen ARM with virtualization extensions white paper"},{"key":"9410_CR72","doi-asserted-by":"crossref","unstructured":"Steinberg U, Kauer B (2010) NOVA: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European conference on computer systems, pp. 209\u2013222","DOI":"10.1145\/1755913.1755935"},{"key":"9410_CR73","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jss.2017.10.033","volume":"136","author":"S Taherizadeh","year":"2018","unstructured":"Taherizadeh S, Jones AC, Taylor I, Zhao Z, Stankovski V (2018) Monitoring self-adaptive applications within edge computing frameworks: a state-of-the-art review. J Syst Softw 136:19\u201338","journal-title":"J Syst Softw"},{"key":"9410_CR74","unstructured":"The Linux Foundation: ARINC 653 Scheduler - Xen (2015). https:\/\/wiki.xenproject.org\/wiki\/ARINC653_Scheduler"},{"issue":"11","key":"9410_CR75","doi-asserted-by":"publisher","first-page":"3715","DOI":"10.3390\/s21113715","volume":"21","author":"I Ungurean","year":"2021","unstructured":"Ungurean I, Gaitan NC (2021) Software architecture of a fog computing node for industrial internet of things. Sensors 21(11):3715","journal-title":"Sensors"},{"key":"9410_CR76","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.fusengdes.2013.10.010","volume":"89","author":"DF Valc\u00e1rcel","year":"2014","unstructured":"Valc\u00e1rcel DF (2014) The JET real-time plasma-wall load monitoring system. Fusion Eng Design 89:243\u2013258","journal-title":"Fusion Eng Design"},{"issue":"7","key":"9410_CR77","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1038\/s41567-022-01602-2","volume":"18","author":"J Vega","year":"2022","unstructured":"Vega J et al (2022) Disruption prediction with artificial intelligence techniques in tokamak plasmas. Nat Phys 18(7):741\u2013750","journal-title":"Nat Phys"},{"key":"9410_CR78","doi-asserted-by":"crossref","unstructured":"Verma G, Gupta Y, Malik AM, Chapman B (2021) Performance evaluation of deep learning compilers for edge inference. In: 2021 IEEE international parallel and distributed processing symposium workshops (IPDPSW), pp. 858\u2013865","DOI":"10.1109\/IPDPSW52791.2021.00128"},{"key":"9410_CR79","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1016\/j.fusengdes.2019.03.050","volume":"146","author":"M Walker","year":"2019","unstructured":"Walker M (2019) Assessment of controllers and scenario control performance for ITER first plasma. Fusion Eng Des 146:1853\u20131857","journal-title":"Fusion Eng Des"},{"key":"9410_CR80","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jpdc.2018.06.009","volume":"132","author":"Z Wang","year":"2019","unstructured":"Wang Z, Sun D, Xue G, Qian S, Li G, Li M (2019) Ada-things: an adaptive virtual machine monitoring and migration strategy for internet of things applications. J Parallel Distrib Comput 132:164\u2013176","journal-title":"J Parallel Distrib Comput"},{"key":"9410_CR81","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1049\/iet-sen:20060076","volume":"1","author":"C Watterson","year":"2007","unstructured":"Watterson C, Heffernan D (2007) Runtime verification and monitoring of embedded systems. IET Software 1:172\u2013179","journal-title":"IET Software"},{"key":"9410_CR82","unstructured":"Wiki.Xenproject (2019) Xen Wiki\u2013RTDS-Based-Scheduler. https:\/\/wiki.xenproject.org\/wiki\/RTDS-Based-Scheduler"},{"issue":"2","key":"9410_CR83","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/TC.2015.2425874","volume":"65","author":"G Yao","year":"2015","unstructured":"Yao G, Yun H, Wu ZP, Pellizzoni R, Caccamo M, Sha L (2015) Schedulability analysis for memory bandwidth regulated multicore real-time systems. IEEE Trans Comput 65(2):601\u2013614","journal-title":"IEEE Trans Comput"},{"key":"9410_CR84","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.sysarc.2017.03.007","volume":"83","author":"Q Zhao","year":"2018","unstructured":"Zhao Q, Gu Z, Zeng H, Zheng N (2018) Schedulability analysis and stack size minimization with preemption thresholds and mixed-criticality scheduling. J Syst Archit 83:57\u201374","journal-title":"J Syst Archit"}],"container-title":["Real-Time Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11241-023-09410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11241-023-09410-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11241-023-09410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T15:31:44Z","timestamp":1706196704000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11241-023-09410-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":84,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9410"],"URL":"https:\/\/doi.org\/10.1007\/s11241-023-09410-4","relation":{},"ISSN":["0922-6443","1573-1383"],"issn-type":[{"type":"print","value":"0922-6443"},{"type":"electronic","value":"1573-1383"}],"subject":[],"published":{"date-parts":[[2023,11,1]]},"assertion":[{"value":"23 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}