Battery-Aware Scheduling of Mixed Criticality Systems

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

13 Citations (Scopus)


Wireless systems such as satellites and sensor networks are often battery-powered. To operate optimally they must therefore take the performance properties of real batteries into account. Additionally, these systems, and therefore their batteries, are often exposed to loads with uncertain timings. Mixed criticality and soft real-time systems may accept deadline violations and therefore enable trade-offs and evaluation of performance by criteria such as the number of tasks that can be completed with a given battery. We model a task set in combination with the kinetic battery model as a stochastic hybrid system and study its performance under battery-aware scheduling strategies. We believe that this evaluation does not scale with current verification techniques for stochastic hybrid systems. Instead statistical model checking provides a viable alternative with statistical guarantees. Based on our model we also calculate an upper bound on the attainable number of task instances from a battery, and we provide a battery-aware scheduler that wastes no energy on instances that are not guaranteed to make their deadlines.
Original languageEnglish
Title of host publicationLeveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications : 6th International Symposium, ISoLA 2014, Imperial, Corfu, Greece, October 8-11, 2014, Proceedings, Part II
EditorsTiziana Margaria, Bernhard Steffen
PublisherSpringer Publishing Company
Publication date2014
ISBN (Print)978-3-662-45230-1
ISBN (Electronic)978-3-662-45231-8
Publication statusPublished - 2014
Event6th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation - Imperial, Corfu, Greece
Duration: 8 Oct 201411 Oct 2014


Conference6th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation
SeriesLecture Notes in Computer Science

Cite this