Filters








17,115 Hits in 3.1 sec

Priority Inheritance Protocol Proved Correct

Xingyuan Zhang, Christian Urban, Chunhan Wu
2019 Journal of automated reasoning  
The Priority Inheritance Protocol is one solution implemented in many systems for solving this problem, but the correctness of this solution has never been formally verified in a theorem prover.  ...  As already pointed out in the literature, the original informal investigation of the Property Inheritance Protocol presents a correctness "proof" for an incorrect algorithm.  ...  He was a stellar student and very promising young researcher in the field of interactive theorem proving. He was liked by many and indispensable for organising the ITP'15 conference in Nanjing.  ... 
doi:10.1007/s10817-019-09511-5 fatcat:mq4xbuxjxbcetp5wkulnsskube

Priority Inheritance Protocol Proved Correct [chapter]

Xingyuan Zhang, Christian Urban, Chunhan Wu
2012 Lecture Notes in Computer Science  
The Priority Inheritance Protocol is one solution implemented in many systems for solving this problem, but the correctness of this solution has never been formally verified in a theorem prover.  ...  As already pointed out in the literature, the original informal investigation of the Property Inheritance Protocol presents a correctness "proof" for an incorrect algorithm.  ...  He was a stellar student and very promising young researcher in the field of interactive theorem proving. He was liked by many and indispensable for organising the ITP'15 conference in Nanjing.  ... 
doi:10.1007/978-3-642-32347-8_15 fatcat:3hplu3rsgrfg5gxagqpgtqgeka

Distributed Priority Inheritance for Real-Time and Embedded Systems [chapter]

César Sánchez, Henny B. Sipma, Christopher D. Gill, Zohar Manna
2006 Lecture Notes in Computer Science  
We study the problem of priority inversion in distributed real-time and embedded systems and propose a solution based on a distributed version of the priority inheritance protocol (PIP).  ...  Previous approaches to priority inversions in distributed systems use variations of the priority ceiling protocol (PCP), originally designed for centralized systems as a modification of PIP that also prevents  ...  To ensure the correctness of the priority inheritance protocol shown here, subprocesses must only increase (never decrease) their priorities while running.  ... 
doi:10.1007/11945529_9 fatcat:so2om4aagnctzd35s5uydvz2qm

Testing for the Conformance of Real-time Protocols Implemented by Operating Systems

Dieter Zöbel, David Polock, Andreas van Arkel
2005 Electronical Notes in Theoretical Computer Science  
They belong to two major families of protocols: the priority inheritance protocols (PIP) and to the priority ceiling protocols (PCP).  ...  Various protocols against priority inversion have been proposed in the literature and are available at system call level of operating systems and run-time executives.  ...  Though the protocols are proved correct an immediate implementation would allow priority inversion [7] and also violate basic theorems [19] .  ... 
doi:10.1016/j.entcs.2004.08.071 fatcat:xj2kgbnjsne5fhxxxzoj4gvspe

Formal modeling and analysis of real-time resource-sharing protocols in Real-Time Maude

Peter Csaba Olveczky, Pavithra Prabhakar, Xue Liu
2008 Proceedings, International Parallel and Distributed Processing Symposium (IPDPS)  
This paper also shows how our general techniques can be instantiated to model and analyze the well known priority inheritance protocol.  ...  This paper presents general techniques for formally modeling, simulating, and model checking real-time resource-sharing protocols in Real-Time Maude.  ...  to the priority inheritance protocol.  ... 
doi:10.1109/ipdps.2008.4536574 dblp:conf/ipps/OlveczkyPL08 fatcat:lian2rt36zcohdbxlwmyiycnfq

Scheduling transactions with stringent real-time constraints

Kwok-Wa Lam, Sang H. Son, Sheung-Lun Hung, Zhiwei Wang
2000 Information Systems  
The simulation results show that the new priority ceiling protocol outperforms other protocols.  ...  In this paper, we propose a new priority ceiling protocol that allows a higher priority transaction to preempt a lower priority transaction on data conflicts by using the notion of dynamic adjustment of  ...  CORRECTNESS OF PCP-DA In this section, we prove the correctness of PCP-DA. For the correctness of PCP-DA, we prove that all histories produced by PCP-DA are serializable.  ... 
doi:10.1016/s0306-4379(00)00027-2 fatcat:adwd37aotbfdhavmkgvnixn52m

Synchronous Modeling and Validation of Priority Inheritance Schedulers [chapter]

Erwan Jahier, Nicolas Halbwachs, Pascal Raymond
2009 Lecture Notes in Computer Science  
We provide a synchronous specification for two shared resource scheduling protocols: the well-known basic priority inheritance protocol (BIP), and the priority ceiling protocol (PCP).  ...  -BIP: The Basic Inheritance Protocol, also known as Priority Inheritance Protocol, refines the previous one to prevent priority inversions.  ...  With Pvs, Dutertre proves very general property about the PCP correctness.  ... 
doi:10.1007/978-3-642-00593-0_10 fatcat:elam2ecvyncrnctadj442antju

Bounding Worst-Case Response Times of Tasks under PIP

Harini Ramaprasad, Frank Mueller
2009 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium  
In this paper, we propose a methodology that incorporates resource sharing policies such as the Priority Inheritance Protocol (PIP) into the calculation of data-cache related delay.  ...  In addition to maintaining correctness of access, such policies strive to limit resource access conflicts, thereby improving the responsiveness of tasks.  ...  By definition of the Priority Inheritance Protocol, J m,n transitively inherits the priority of J i,j and finishes using resource R ′ .  ... 
doi:10.1109/rtas.2009.28 dblp:conf/rtas/RamaprasadM09 fatcat:b36fvb6cxbeqnawdznidlfae6i

Page 511 of IEEE Transactions on Computers Vol. 52, Issue 4 [page]

2003 IEEE Transactions on Computers  
According to the definitions of the 2VPCP protocol, r, can block Ty only if 7, directly blocks 7;; because of a lock request or 7, inherits a priority higher than the priority of 7.  ...  In other words, r’ must inherit the priority of some transaction instance which is higher than RW PL, to certify-lock O,.  ... 

The priority ceiling protocol: A method for minimizing the blocking of high priority Ada tasks

J. B. Goodenough, L. Sha
1988 ACM SIGAda Ada Letters  
Under the priority ceiling protocol, a high priority task can be blocked at most once by a lower proirity task. This paper defines how to apply the protocol to Ada.  ...  The priority ceiling protocol is a new technique that addresses the priority inversion problem, i.e., the possibility that a high-priority task can be delayed by a low-priroity task.  ...  Summary Both the basic priority inheritance protocol and the priority ceiling protocol correct the unbounded priority inversion problem caused by existing Ada rules.  ... 
doi:10.1145/59368.59371 fatcat:ke3vyd34zff4vl7pvbtnjvaecu

The priority ceiling protocol: A method for minimizing the blocking of high priority Ada tasks

J. B. Goodenough, L. Sha
1988 Proceedings of the second international workshop on Real-time Ada issues - IRTAW '88  
Under the priority ceiling protocol, a high priority task can be blocked at most once by a lower proirity task. This paper defines how to apply the protocol to Ada.  ...  The priority ceiling protocol is a new technique that addresses the priority inversion problem, i.e., the possibility that a high-priority task can be delayed by a low-priroity task.  ...  Summary Both the basic priority inheritance protocol and the priority ceiling protocol correct the unbounded priority inversion problem caused by existing Ada rules.  ... 
doi:10.1145/58612.59371 fatcat:kghkchduwvad7hqyxltjwfz5nu

MINIX4RT: Real-time Semaphores

Pablo Andrés Pessolani
2008 Journal of Computer Science and Technology  
Semaphores were added to MINIX4RT, and since it is a Real-Time Operating System, they must meet some processing requirements such as dequeueing waiting processes in priority order and avoiding the Priority  ...  They are the Basic Priority Inheritance Protocol (BPIP) and the Priority Ceiling Protocol (PCP).  ...  A sample of this is the use of Priority Lists and the use of the Basic Priority Inheritance Protocol.  ... 
doaj:b38cc68ee7c5451c92ecd0fe3a6766fa fatcat:jpmwgnpcqbfyjdnzib3inhhgte

Verifying periodic programs with priority inheritance locks

Sagar Chaki, Arie Gurfinkel, Ofer Strichman
2013 2013 Formal Methods in Computer-Aided Design  
A common synchronization mechanism for such programs is via Priority Inheritance Protocol (PIP) locks. PIP locks have low programming overhead, but cause deadlocks if used incorrectly.  ...  Our algorithm, called PIPVERIF, is iterative and optimal -it terminates after sequentializing with the smallest number of rounds required to either find a counterexample, or prove the program safe and  ...  Real-time operating systems [6] typically support two versions -the Priority Ceiling Protocol (PCP) lock and the Priority Inheritance Protocol (PIP) lock.  ... 
doi:10.1109/fmcad.2013.6679402 fatcat:salyk4krozbzdanrsuu7sxgu4i

Resource access control for dynamic priority distributed real-time systems

Chen Zhang, David Cordes
2006 Real-time systems  
These protocols are based on (i) distributed resource preclaiming that allocates resources in the message-based distributed system for deadlock prevention, (ii) distributed priority inheritance that bounds  ...  local and remote priority inversion, and (iii) distributed preemption ceilings that delimit the priority inversion time further.  ...  Under this scenario, DPPIP inherits properties of the basic priority inheritance protocol proved in section III.B of [12] .  ... 
doi:10.1007/s11241-006-8642-5 fatcat:3j5tuxwvbvhsdjnjau7hz6iq5i

Avoiding unbounded priority inversion in barrier protocols using gang priority management

Harald Röck, Joshua Auerbach, Christoph M. Kirsch, David F. Bacon
2009 Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems - JTRES '09  
We introduce gang priority management as a generic solution for avoiding unbounded priority inversion in barrier protocols.  ...  Such barrier protocols, however, still suffer from priority inversion similar to centralized locking.  ...  Later on, a formal definition of the problem and solutions, called priority inheritance protocols, were presented and were proved to solve the unbounded delay induced by priority inversion [30] .  ... 
doi:10.1145/1620405.1620416 dblp:conf/jtres/RockAKB09 fatcat:mgf2k5v56vgahpfhxmkwze6yoy
« Previous Showing results 1 — 15 out of 17,115 results