Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Moritz Neukirchner is active.

Publication


Featured researches published by Moritz Neukirchner.


euromicro conference on real-time systems | 2013

Response-Time Analysis of Parallel Fork-Join Workloads with Real-Time Constraints

Philip Axer; Sophie Quinton; Moritz Neukirchner; Rolf Ernst; Björn Döbel; Hermann Härtig

The advent of multi- and many-core processors comes with new challenges and opportunities for the designer of embedded real-time applications. By using parallel programming techniques (e.g. OpenMP) software engineers can leverage from the available hardware parallelism and speed up the algorithms. The inherent redundancy of multi-core architectures can also be used to implement fault-tolerance by executing code redundantly on multiple cores in parallel. Parallel programming and redundant execution are typical examples for fork-join tasks in which the program is partially parallelized. However, complex synchronization of parallel segments across multiple cores can cause unanticipated effects. This is especially problematic in hard real-time applications where data must be available in bounded time (e.g. stereo vision for pedestrian detection). The contribution of this work is a novel worst-case response time analysis which accounts for synchronization of fork-join tasks with arbitrary deadlines. We apply the analysis to the Romain framework which extends the L4 micro kernel by redundant multithreading targeted towards fault-tolerant embedded systems. By using formal analysis, we show that parallelizing workloads can lead to drastic performance impairments compared to traditional sequential execution if not done carefully.


real-time systems symposium | 2012

Monitoring Arbitrary Activation Patterns in Real-Time Systems

Moritz Neukirchner; Tobias Michaels; Philip Axer; Sophie Quinton; Rolf Ernst

Model-based verification of timing properties has become industrial practice in design processes of safety-critical hard real-time systems. To validate the correctness of the used verification model, systems are additionally monitored during regular operation. With a growing variety of activation patterns considered in verification, some of them with infinite range capturing arbitrary activation patterns, the known approaches to monitoring, which assume periodic streams, have become inapplicable or they suffer from large overhead due to piecewise continuous time monitoring. In this paper we present a light-weight monitoring approach for arbitrary activation patterns. It profits from the discrete time property of a minimum distance event representation which is used instead of the continuous time representation used in earlier approaches. The method has a configurable constant runtime overhead in terms of memory and computation and allows conservative monitoring of a given arbitrary minimum distance function. Furthermore, we provide conditions under which the monitoring function is exact.


international conference on hardware/software codesign and system synthesis | 2013

Multi-mode monitoring for mixed-criticality real-time systems

Moritz Neukirchner; Kai Lampka; Sophie Quinton; Rolf Ernst

We present a scheme for monitoring activation patterns of multiple tasks in mixed-criticality real-time systems. Unlike previous approaches, which enforce a single pre-defined activation pattern bound per task, we propose a multi-mode approach, where monitors can dynamically switch between different configurations, depending on the observed activation pattern at other tasks. The required configurations are based on real-time interfaces which we determine through sensitivity analysis. In an evaluation we show, that switching between monitor configurations allows to dynamically reassign timing slack between tasks and thereby achieve better resource utilization and still provide the same timing guarantees.


international symposium on system-on-chip | 2009

RTL-to-layout implementation of an embedded coarse grained architecture for dynamically reconfigurable computing in systems-on-chip

Fabio Campi; Ralf König; M. Dreschmann; Moritz Neukirchner; Damien Picard; Michael Jüttner; Eberhard Schüler; Antonio Deledda; Davide Rossi; Alberto Pasini; Michael Hübner; Jürgen Becker; Roberto Guerrieri

This paper describes the RTL-to-layout implementation of the PACT XPP-III coarse-grained reconfigurable architecture (CGRA). The implementation activity was strictly based on a hierarchical approach in order to exploit performance optimization at all levels, as well as guarantee maximum scalability and provide a portfolio of IP-blocks that could be reused to build different configurations and embodiments of the same CGRA template. The final result can be seamlessly introduced in any SoC design flow as embedded accelerator. It is designed in STMicroelectronics 90nm GP technology, occupies 42.5 mm2, delivers 13 16-bit GOPS (0.8 GOPS/mW, 10 MOPS/mW) and has a measured max frequency of 150 MHZ, requiring a measured 13 mW/MHz dynamic power, 93 mW static. A silicon prototype was also produced embedding XPP-III in a complex system-on-chip including an ARM processor as system controller as well as different ASIC blocks.


design, automation, and test in europe | 2013

Sensitivity analysis for arbitrary activation patterns in real-time systems

Moritz Neukirchner; Sophie Quinton; Tobias Michaels; Philip Axer; Rolf Ernst

Response time analysis, which determines whether timing guarantees are satisfied for a given system, has matured to industrial practice and is able to consider even complex activation patterns modelled through arrival curves or minimum distance functions. On the other side, sensitivity analysis, which determines bounds on parameter variations under which constraints are still satisfied, is largely restricted to variation of single-valued parameters as e.g. task periods. In this paper we provide a sensitivity analysis to determine the bounds on the admissible activation pattern of a task, modelled through a minimum distance function. In an evaluation on a set of synthetic testcases we show, that the proposed algorithm provides significantly tighter bounds, than previous exact analyses, that determine allowable parametrizations of activation patterns.


international symposium on industrial embedded systems | 2011

Contract-based dynamic task management for mixed-criticality systems

Moritz Neukirchner; Steffen Stein; Harald Schrom; Johannes Schlatow; Rolf Ernst

The use of models is becoming increasingly prominent in the development processes for safety and time critical systems (e.g. in automotive or aerospace). However, oftentimes the models of a component, its implementation properties and execution parameters are only loosely coupled. This missing association complicates system maintainability and becomes an issue with increasing system flexibility. This paper presents a runtime environment closely coupling design-time component models with the execution parameters of the specific component also enabling runtime monitoring of implementation properties. Together with a previously published admission control scheme, this enables tight coupling of component-wise design-time modelling, system analysis and runtime configuration, enabling software flexibility also in mixed-criticality systems.


design, automation, and test in europe | 2010

A software update service with self-protection capabilities

Moritz Neukirchner; Steffen Stein; Harald Schrom; Rolf Ernst

Integration of system components is a crucial challenge in the design of embedded real-time systems, as complex non-functional interdependencies may exist. We propose a software update service with self-protection capabilities against unverified system updates - thus solving the integration problem in-system. As modern embedded systems may evolve through software updates, component replacement or even self-optimization, possible system configurations are hard to predict. Thus the designer of system updates does not know the exact system configuration. This turns the proof of system feasibility into a critical challenge. This paper presents the architecture of a framework and associated protocols enabling updates in embedded systems while ensuring safe operation w.r.t. non-functional properties. The proposed process employs contract based principles at the interfaces towards applications to perform an in-system verification. Practical feasibility of our approach is demonstrated by an implementation of the update process, which is analzed w.r.t. the memory consumption overhead and execution time.


design automation conference | 2014

Sufficient Temporal Independence and Improved Interrupt Latencies in a Real-Time Hypervisor

Matthias Beckert; Moritz Neukirchner; Rolf Ernst; Stefan M. Petters

Virtualization techniques for hard real-time systems typically employ TDMA scheduling to achieve temporal isolation among partitions. The processing of user-level interrupt handlers is only performed within appropriate time slots, thus significantly increasing interrupt latencies. We propose a novel approach permitting execution of user-level interrupt handlers during time slots of other partitions hence reducing interrupt latencies. Sufficient temporal independence among partitions, as required by safety standards, is maintained through a monitoring mechanism, which bounds the interference of user-level interrupt handlers in other partitions. We show correctness of the approach and evaluate its performance in a hypervisor implementation.


international conference on hardware/software codesign and system synthesis | 2014

Workload-aware shaping of shared resource accesses in mixed-criticality systems

Sebastian Tobuschat; Moritz Neukirchner; Leonardo Ecco; Rolf Ernst

For mixed-criticality systems, safety standards (e.g. ISO 26262) require sufficient independence among different criticality levels, unless the entire system is certified according to the highest applicable level. We present a resource arbitration scheme that provides sufficient independence among different criticality levels w.r.t. timing properties. We exploit throughput and latency slack of critical applications by prioritizing non-critical over critical accesses and only switching priorities when necessary. By using an accurate representation of resource access patterns and workloads, the proposed arbitration scheme achieves an improved resource utilization compared to classical approaches that use simple access counters. The approach allows to provide service guarantees for critical applications, while reducing the adverse effects through strict prioritization on non-critical applications.


emerging technologies and factory automation | 2011

Bounding mode change transition latencies for multi-mode real-time distributed applications

Mircea Negrean; Moritz Neukirchner; Steffen Stein; Simon Schliecker; Rolf Ernst

Predicting timing behaviour is essential for the design of embedded real-time systems that can switch between different operational modes at runtime. The settling time of a mode change, called mode change transition latency, is an important system parameter. Known approaches that address the problem of timing analysis for multi-mode real-time systems are restricted to applications without communicating tasks. Also, these assume that transitions are initiated only during a steady state, however, without indicating when a system executes in a steady state. In this paper, we present an analysis algorithm which gives a maximum bound on each mode change transition latency of multi-mode distributed applications thereby overcoming limitations of previous work. We explain the algorithm, prove its correctness, illustrate the steps and provide experimental data that show its usefulness.

Collaboration


Dive into the Moritz Neukirchner's collaboration.

Top Co-Authors

Avatar

Rolf Ernst

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Steffen Stein

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Tobias Michaels

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Harald Schrom

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mircea Negrean

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Philip Axer

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sophie Quinton

Braunschweig University of Technology

View shared research outputs
Top Co-Authors

Avatar

Eberhard Schüler

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jürgen Becker

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge