4,472 Hits in 6.6 sec

Resource access control for dynamic priority distributed real-time systems

Chen Zhang, David Cordes
2006 Real-time systems  
local and remote priority inversion, and (iii) distributed preemption ceilings that delimit the priority inversion time further.  ...  These protocols are based on (i) distributed resource preclaiming that allocates resources in the message-based distributed system for deadlock prevention, (ii) distributed priority inheritance that bounds  ...  Mutual Exclusion: Mutual exclusion is ensured through Theorem 1, shown below. Here grant_set i represents for the set of resources currently granted to critical segments CS i .  ... 
doi:10.1007/s11241-006-8642-5 fatcat:3j5tuxwvbvhsdjnjau7hz6iq5i

The implementation of the Priority Ceiling Protocol in Ada-2005

Albert M. K. Cheng, James Ras
2007 ACM SIGAda Ada Letters  
PCP is an extension of the Priority Inheritance Protocol (PIP), with the added features of preventing deadlocks and priority inversions.  ...  It still has a strong focus on real-time response, multi-tasking, and sound engineering. It is the only international standard for object-oriented real-time distributed programming.  ...  Goodenough and Dr. Lui Sha for their work on the Priority Inheritance Protocols and Ada. And special thanks to all the researchers and volunteers who made Ada 2005 possible.  ... 
doi:10.1145/1274610.1274611 fatcat:2j7iyo3ivrbb5oqa5s6cqwycki

Integrated computer-aided design system software of navigation complex

Victor Sineglazov, Andrew Godny
2016 2016 4th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)  
Presented scheduling mechanisms for computeraided design system for unmanned aerial vehicles with an integrated environment introduces a new approach to managing hardware resources and design time management  ...  This way of organizing mutual exclusion mode prevents multiple blocking of tasks and even more so -eliminates the possibility of a deadlock.  ...  Indeed, the beneficial properties are provided exclusively through the introduction of a mechanism of blocking by ceil priorities.  ... 
doi:10.1109/msnmc.2016.7783106 fatcat:wdm4toemrvh27bqamky5xoxzb4

Distributed Priority Inheritance for Real-Time and Embedded Systems [chapter]

César Sánchez, Henny B. Sipma, Christopher D. Gill, Zohar Manna
2006 Lecture Notes in Computer Science  
We study the problem of priority inversion in distributed real-time and embedded systems and propose a solution based on a distributed version of the priority inheritance protocol (PIP).  ...  Previous approaches to priority inversions in distributed systems use variations of the priority ceiling protocol (PCP), originally designed for centralized systems as a modification of PIP that also prevents  ...  Dynamic Priorities: Most dynamic priority scheduling algorithms, like EDF, require querying for the current status of existing processes to define their relative priorities.  ... 
doi:10.1007/11945529_9 fatcat:so2om4aagnctzd35s5uydvz2qm

The Ravenscar profile for high-integrity Java programs?

Brian Dobbing
2001 ACM SIGAda Ada Letters  
Key personnel involved in the definition of the Real-Time Annex for Ada95 and the Ravenscar Profile also influenced the design of the real-time extensions to Java, and so it is not surprising that these  ...  The recent explosion in interest and use of the Java platform for embedded devices has exposed basic flaws in the semantics of its real-time constructs, and this has led to initiatives to extend the language  ...  suspension operations and that define a Ceiling Priority for implementation of mutual exclusion (c.f.  ... 
doi:10.1145/374369.374382 fatcat:m2wrjo5npvbv5gymh5fspah76m

Integrating Priority Inheritance Algorithms in the Real-Time Specification for Java

Andy Wellings, Alan Burns, Osmar Marchi dos Santos, Benjamin M. Brosgol
2007 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)  
The two most commonly used priority inheritance protocols are basic priority inheritance and priority ceiling emulation.  ...  Priority inversion and priority inheritance protocols for bounding blocking time are well-understood topics in real-time systems research.  ...  Acknowledgements The authors gratefully acknowledge the contributions of David Holmes, Peter Dibble, Rudy Belliardi and Doug Locke to some of the work presented in this paper.  ... 
doi:10.1109/isorc.2007.40 dblp:conf/isorc/WellingsBSB07 fatcat:kh2vfowtm5axrbsp3op4scxhuu

System Software [chapter]

Peter Marwedel
2021 Embedded Systems  
We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel.  ...  Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols.  ...  The Distributed Priority Ceiling Protocol (DPCP) [466] and the Multiprocessor Priority Ceiling Protocol (MPCP) [465] are extensions of PCP for multiprocessors.  ... 
doi:10.1007/978-3-030-60910-8_4 fatcat:xtc64f3zqfd53e7ybwtfoe4dla

Implementation and Evaluation of the Synchronization Protocol Immediate Priority Ceiling in PREEMPT-RT Linux

Andreu Carminati, Rômulo Silva de Oliveira, Luís Fernando Friedrich
2012 Journal of Software  
The objective of this paper is to propose the implementation of an alternative protocol, the Immediate Priority Ceiling, for use in drivers dedicated to real-time applications, for example.  ...  This article explains how the protocol was implemented in the real-time kernel and compares tests on the protocol implemented and Priority Inheritance, currently used in the real-time kernel.  ...  Mutual Exclusion in the Linux Kernel Since there is no mechanism in the mainline kernel that prevents the appearance of priority inversions, situations like the one shown in Figure 1 can occur very easily  ... 
doi:10.4304/jsw.7.3.516-525 fatcat:uzquqfwjabaitbk3nwtqgwwhuq

Relaxing Resource-Sharing Constraints for Improved Hardware Management and Schedulability

Bryan C. Ward
2015 2015 IEEE Real-Time Systems Symposium  
This paper presents two new classes of sharing constraints, preemptive mutual exclusion, and half-protected sharing, which are motivated by the sharing constraints of buses and caches, respectively.  ...  However, accesses to some hardware resources can be managed with more relaxed sharing constraints than mutual exclusion while still mitigating timing-interference channels.  ...  For the simple case of non-preemptive mutual exclusion, the ceiling of each resource is defined to be the highest-priority task that accesses that resource.  ... 
doi:10.1109/rtss.2015.22 dblp:conf/rtss/Ward15 fatcat:542pnxpstnhgjbk4m2x7yp5ya4

Chip-multiprocessor hardware locks for safety-critical Java

Tórur Biskopstø Strøm, Wolfgang Puffitsch, Martin Schoeberl
2013 Proceedings of the 11th International Workshop on Java Technologies for Real-time and Embedded Systems - JTRES '13  
The performance and the hardware cost are evaluated.  ...  The solution is implemented for the chip-multiprocessor version of the Java Optimized Processor in the context of safety-critical Java. The implementation is compared to a software solution.  ...  Acknowledgments This work is part of the project "Certifiable Java for Embedded Systems" (CJ4ES) and has received partial funding from the Danish Research Council for Technology and Production Sciences  ... 
doi:10.1145/2512989.2512995 dblp:conf/jtres/StromPS13 fatcat:c5h3n3zvx5e7hhay2q4vgl3jwu

Energy-Efficient Scheduling of Real-time Tasks with Abortable Critical Sections

Jun Wu, Kai-Long Kao
2012 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems  
In this paper, CB-CAS introduces a conditional abort rule and a dynamic speed adjustment method to work with the rate monotonic scheduling algorithm and the priority ceiling protocol so that the energy  ...  Whenever two tasks are conflicting for the same resource, CB-CAS will examine the cost of blocking the higher-priority task and the cost of aborting the lower-priority task.  ...  ACKNOWLEDGEMENT The authors would like to acknowledge the two anonymous referees for their valuable comments in improving the quality of the paper.  ... 
doi:10.1109/hpcc.2012.269 dblp:conf/hpcc/WuK12 fatcat:abizops5lja7bplgo7x5du4zj4

Reservation based protocol for resolving priority inversions in composable conveyor systems

Abdelrhman Mahamadi, Mukesh Chippa, Shivakumar Sastry
2017 Journal of systems architecture  
When there is prioritized access to shared resources, it is natural consequence for a low-priority task to be serviced before a high-priority task for a bounded duration of  ...  Date ii ABSTRACT A reservation based protocol for resolving priority inversions in decentralized realtime systems that are useful in the domain of advanced manufacturing is presented.  ...  A token-based scheme for achieving distributed mutual exclusion in a completely interconnected system is reported in [8] .  ... 
doi:10.1016/j.sysarc.2016.11.008 fatcat:5gy5hnvvvzamtbph4wbk5haojq

Fast on Average, Predictable in the Worst Case: Exploring Real-Time Futexes in LITMUSRT

Roy Spliet, Manohar Vanga, Bjorn B. Brandenburg, Sven Dziadek
2014 2014 IEEE Real-Time Systems Symposium  
Motivated by the futex implementation in Linux, where uncontended locks under the Priority Inheritance Protocol (PIP) do not incur kernel-switching overheads, we extend this concept to more sophisticated  ...  protocols; namely the PCP, the MPCP and the FMLP + .  ...  INTRODUCTION Suspension-based real-time locking protocols, such as the Priority Inheritance Protocol (PIP), are used in real-time systems to ensure mutually exclusive access to shared resources while preventing  ... 
doi:10.1109/rtss.2014.33 dblp:conf/rtss/SplietVBD14 fatcat:vgyh4sadkfakhm3vovsqex36oy

Resolving priority inversions in composable conveyor systems

Shivakumar Sastry, Aniruddha Gokhale
2014 Journal of systems architecture  
We present a novel adaptation of the classical priority inheritance protocol for resolving these cyber-physical priority inversions.  ...  Further, these constraints also limit the applicability of the classical priority ceiling protocol in this class of cyber-physical systems.  ...  Acknowledgments The authors thank Kranthi Mamidisetty, Brandon Archer, and Mukesh Chippa for executing some of the simulations.  ... 
doi:10.1016/j.sysarc.2014.02.003 fatcat:rkcbk7qdevgrfknwbsp2gyiaku

Real-time convergence of Ada and Java#8482;

Ben Brosgol, Brian Dobbing
2001 Proceedings of the 2001 annual ACM SIGAda international conference on Ada - SIGAda '01  
This paper summarizes the major features of these efforts, compares them to each other and to Ada 95's Real-Time Annex, and argues that their convergence with Ada95 may serve to complement rather than  ...  Mutex locks and monitors require priority inheritance to be applied in addition to mutual exclusion.  ...  objects and methods, that (may) prohibit voluntary suspension operations, and that define a Ceiling Priority for implementation of mutual exclusion (c.f.  ... 
doi:10.1145/507574.507579 dblp:conf/sigada/BrosgolD01 fatcat:7indzj2eivexzmpxq3jphisyfa
« Previous Showing results 1 — 15 out of 4,472 results