By Topic

A Sufficient Schedulability Test for Real-Time Software Transactional Memory

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chaitanya Belwal ; Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA ; Albert M. K. Cheng

Transactional Memory (TM) is a mechanism to control access to shared resources in memory. Though originally implemented in hardware, software implementations of TM are now available as library extensions in major programming language. Lately, variants of software transactional memory (STM) with real-time support have been presented. As real-time STM begins to be increasingly used in commercial embedded systems, a good understanding of their temporal properties for ascertaining real-time guarantees is required. Unlike the classical models of preemptive or non- preemptive execution, in STM higher priority tasks can induce an abort cost in addition to the interference cost on preempted lower priority tasks. Due to the abort cost, several existing approaches developed for the classical model cannot be used to ascertain real-time guarantees in STM. In this paper, we convert the abort costs induced by higher priority tasks into new phantom tasks and transform the transactional execution model of STM into a pessimistic preemptive model. An existing iterative method to compute response time is then applied to determine schedulability. This approach is utilized to derive a polynomial time sufficient schedulability test for both the lazy and eager conflict detection polices of STM. Experiment results to validate the sufficient test and analyze its coverage are presented.

Published in:

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications

Date of Conference:

16-18 Nov. 2011