{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T02:44:57Z","timestamp":1778121897871,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"vor","delay-in-days":380,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2038960"],"award-info":[{"award-number":["2038960"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3567848","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"46-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard Constraints"],"prefix":"10.1145","author":[{"given":"Shengjie","family":"Xu","sequence":"first","affiliation":[{"name":"The University of North Carolina (UNC) at Chapel Hill"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bineet","family":"Ghosh","sequence":"additional","affiliation":[{"name":"The University of North Carolina (UNC) at Chapel Hill"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Clara","family":"Hobbs","sequence":"additional","affiliation":[{"name":"The University of North Carolina (UNC) at Chapel Hill"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P. S.","family":"Thiagarajan","sequence":"additional","affiliation":[{"name":"The University of North Carolina (UNC) at Chapel Hill"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Samarjit","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"The University of North Carolina (UNC) at Chapel Hill"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"P. Axer et al. 2014. Building Timing Predictable Embedded Systems. ACM Trans. Embed. Comput. Syst. (2014).","DOI":"10.1145\/2560033"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.919277"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"W. Chang and S. Chakraborty. 2016. Resource-aware Automotive Control Systems Design: A Cyber-Physical Systems Approach. Found. Trends Electron. Des. Autom. 10 4 (2016).","DOI":"10.1561\/1000000045"},{"key":"e_1_3_2_1_4_1","unstructured":"R. A. Gabel and R. A. Roberts. 1980. Signals and Linear Systems (second ed.). John Wiley & Sons."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"B. Ghosh et al. 2022. Statistical Hypothesis Testing of Controller Implementations Under Timing Uncertainties. In RTCSA.","DOI":"10.1109\/RTCSA55878.2022.00008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D. Goswami et al. 2011. Re-engineering cyber-physical control applications for hybrid communication protocols. In DATE.","DOI":"10.1109\/DATE.2011.5763148"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2014.2301795"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.477249"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Z. Hammadeh et al. 2017. Bounding Deadline Misses in Weakly-Hard Real-Time Systems with Task Dependencies. In DATE.","DOI":"10.23919\/DATE.2017.7927054"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"C. Hobbs et al. 2022. Safety Analysis of Embedded Controllers under Implementation Platform Timing Uncertainties. In EMSOFT.","DOI":"10.1109\/TCAD.2022.3198905"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"C. Huang et al. 2019. Formal Verification of Weakly-Hard Systems. In HSCC.","DOI":"10.1145\/3302504.3311811"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"L. Ju et al. 2008. Performance debugging of Esterel specifications. In CODES+ISSS.","DOI":"10.1145\/1450135.1450175"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"S. Linsenmayer and F. Allg\u00f6wer. 2017. Stabilization of networked control systems with weakly hard real-time dropout description. In CDC.","DOI":"10.1109\/CDC.2017.8264364"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"M. Lukasiewycz et al. 2013. System architecture and software design for electric vehicles. In DAC.","DOI":"10.1145\/2463209.2488852"},{"key":"e_1_3_2_1_15_1","unstructured":"M. Maggio et al. 2020. Control-System Stability Under Consecutive Deadline Misses Constraints. In ECRTS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"A. Masrur et al. 2010. VM-Based Real-Time Services for Automotive Control Applications. In RTCSA.","DOI":"10.1109\/RTCSA.2010.38"},{"key":"e_1_3_2_1_17_1","unstructured":"W. C. Messner and D. M. Tilbury. 1998. Control tutorials for MATLAB and Simulink: a web-based approach. http:\/\/ctms.engin.umich.edu\/CTMS"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of Machine Learning Research 123","author":"O'Kelly M.","year":"2020","unstructured":"M. O'Kelly, et al. 2020. F1tenth: An open-source evaluation environment for continuous control and reinforcement learning. Proceedings of Machine Learning Research 123 (2020)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"K. Osman et al. 2009. Modelling and controller design for a cruise control system. CSPA (2009).","DOI":"10.1109\/CSPA.2009.5069228"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"P. Pazzaglia et al. 2021. Adaptive Design of Real-Time Control Systems subject to Sporadic Overruns. In DATE.","DOI":"10.23919\/DATE51398.2021.9473913"},{"key":"e_1_3_2_1_21_1","volume-title":"DMAC: Deadline-Miss-Aware Control. In ECRTS.","author":"Pazzaglia P.","year":"2019","unstructured":"P. Pazzaglia, et al. 2019. DMAC: Deadline-Miss-Aware Control. In ECRTS."},{"key":"e_1_3_2_1_22_1","unstructured":"P. Pazzaglia et al. 2018. Beyond the Weakly Hard Model: Measuring the Performance Cost of Deadline Misses. In ECRTS."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"D. Roy et al. 2016. Multi-Objective Co-Optimization of FlexRay-Based Distributed Control Systems. In RTAS.","DOI":"10.1109\/RTAS.2016.7461344"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"R. Schneider et al. 2011. Constraint-Driven Synthesis and Tool-Support for FlexRay-Based Automotive Control Systems. In CODES+ISSS.","DOI":"10.1145\/2039370.2039394"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"T. Sehnke et al. 2017. Temporal properties in automotive control software. In RTNS.","DOI":"10.1145\/3139258.3139279"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2583064"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126497"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"E. P. van Horssen et al. 2016. Performance analysis and controller improvement for linear systems with (m k)-firm data losses. In ECC.","DOI":"10.1109\/ECC.2016.7810677"},{"key":"e_1_3_2_1_29_1","unstructured":"G. von der Br\u00fcggen et al. 2018. Efficiently approximating the probability of deadline misses in real-time systems. In ECRTS."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"N. Vreman et al. 2022. WeaklyHard.jl: Scalable Analysis of Weakly-Hard Constraints. In RTAS.","DOI":"10.1109\/RTAS54340.2022.00026"}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567848","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:32:42Z","timestamp":1767807162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":30,"alternative-id":["10.1145\/3566097.3567848","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3567848","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}