2018 IEEE International Conference on Industrial Internet (ICII) 2018
DOI: 10.1109/icii.2018.00014
|View full text |Cite
|
Sign up to set email alerts
|

A Utilization-Based Approach for Schedulability Analysis in Wireless Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…In [57] the authors develop an analytical framework targeting network scheduling based on utilization metrics. This is an open research topic in the area of wireless sensor networks, applied also to ISA100 Wireless enabled systems.…”
Section: ) Network Administrationmentioning
confidence: 99%
See 1 more Smart Citation
“…In [57] the authors develop an analytical framework targeting network scheduling based on utilization metrics. This is an open research topic in the area of wireless sensor networks, applied also to ISA100 Wireless enabled systems.…”
Section: ) Network Administrationmentioning
confidence: 99%
“…Real-time aspect Method introduced Metrics improved [57] network flow utilization schedulability analysis max utilization bound [58], [59] network management dynamic resource reservation and management higher network management efficiency [60] visual management simulated reality topological distribution online analysis, remote monitoring [61] network synchronization self-stabilizing firefly synchronization complete faulttolerance, robustness against the interference, accuracy without any central control [62] network software design modular application and system management design successful control loop system building [63] message delivery hard requirements message scheduling method on shared timeslots real-time message delivery within deadlines [64] real-time delivery throughput, end-toend delay grouped into distinct groups, and then take over the equivalent channels in the allocated time cycles by estimating a collision based stochastic threshold. The performance evaluation demonstrates that this approach significantly enhances the network throughput and the end-to-end data access delay.…”
Section: Articlementioning
confidence: 99%