By Topic

Real-Time and Embedded Technology and Applications Symposium, 2009. RTAS 2009. 15th IEEE

Date 13-16 April 2009

Filter Results

Displaying Results 1 - 25 of 43
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Notional Processors: An Approach for Multiprocessor Scheduling

    Publication Year: 2009, Page(s):3 - 12
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Consider the problem of designing an algorithm with a high utilization bound for scheduling sporadic tasks with implicit deadlines on identical processors. A task is characterized by its minimum interarrival time and its execution time. Task preemption and migration is permitted. Still, low preemption and migration counts are desirable.We formulate an algorithm with a utilization bound no less tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of the Dynamic and Static Multiprocessor Priority Ceiling Protocol and the Multiprocessor Stack Resource Policy in an SMP System

    Publication Year: 2009, Page(s):13 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    There has been significant study of implementations of a variety of priority inversion control algorithms in uniprocessor systems, but there has been far less work done on the multiprocessor implementations of these algorithms. Herein, we will present such an evaluation of the Multiprocessor Priority Ceiling Protocol (MPCP) and the Multiprocessor Stack Resource Policy (MSRP). To our knowledge, no ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-partitioned Fixed-Priority Scheduling on Multiprocessors

    Publication Year: 2009, Page(s):23 - 32
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    This paper presents a new algorithm for fixed-priority scheduling of sporadic task systems on multiprocessors.The algorithm is categorized to such a scheduling class that qualifies a few tasks to migrate across processors, while most tasks are fixed to particular processors. We design the algorithm so that a task is qualified to migrate, only if it cannot be assigned to any individual processors, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimizing WCET for Real-Time Embedded Systems via Static Instruction Cache Locking

    Publication Year: 2009, Page(s):35 - 44
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Cache is effective in bridging the gap between processor and memory speed. It is also a source of unpredictability because of its dynamic and adaptive behavior. Worst-case execution time (WCET) of an application is one of the most important criteria for real-time embedded system design. The unpredictability of instruction miss/hit behavior in the instruction cache (I-Cache) leads to an unnecessary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Prediction of Worst-Case Data Cache Performance in the Absence of Base Address Information

    Publication Year: 2009, Page(s):45 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    While caches are essential to reduce execution time and power consumption, they complicate the estimation of the worst-case execution time (WCET), crucial for many real-time systems (RTS). Most research on static worst-case cache behavior prediction has focused on hard RTS, which need complete information on the access patterns and addresses of the data to guarantee the predicted WCET is a safe up... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Identification for WCET Analysis

    Publication Year: 2009, Page(s):55 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Worst-Case Execution Time (WCET) analysis derives upper bounds for the execution times of programs. Such bounds are crucial when designing and verifying real-time systems. Static WCET analysis derives safe upper bounds. For complex hardware architectures the hardware modelling is still a challenge, leading to long analysis times and a risk of large WCET overestimation. Therefore, hybrid WCET analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSL: A Language to Specify and Re-specify Mobile Sensor Network Behaviors

    Publication Year: 2009, Page(s):67 - 76
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1125 KB) | HTML iconHTML

    The Collaborative Sensing Language (CSL) is a high-level feedback control language for mobile sensor networks (MSN). It specifies MSN controllers to accomplish network objectives with a dynamically changing ad-hoc resource pool. Furthermore, CSL is designed to allow the updating of controllers during execution (patching). This enables hierarchical control with simpler controllers at lower levels. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Execution Strategies for PTIDES, a Programming Model for Distributed Embedded Systems

    Publication Year: 2009, Page(s):77 - 86
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (953 KB) | HTML iconHTML

    We define a family of execution policies for a programming model called PTIDES (programming temporally integrated distributed embedded systems). A PTIDES application (factory automation, for example) is given as a discrete-event (DE) model of a distributed real-time system that includes sensors and actuators. The time stamps of DE events are bound to physical time at the sensors and actuators, tur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Dynamic Reconfiguration of a Large-Scale Battery System

    Publication Year: 2009, Page(s):87 - 96
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Electric vehicles powered with large-scale battery packs are gaining popularity as gasoline price soars. Large-scale battery packs usually consist of an estimated 12,000 battery cells connected in series and parallel, which are susceptible to battery-cell failures. Unfortunately, current battery-management systems are unable to handle the inevitable battery-cell failures very well. To address this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety

    Publication Year: 2009, Page(s):99 - 107
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Embedded systems in safety-critical environments demand safety guarantees while providing many useful services that are too complex to formally verify or fully test. Existing application-level fault-tolerance methods, even if formally verified, leave the system vulnerable to errors in the real-time operating system (RTOS), middleware, and microprocessor. We introduce the system-level simplex archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QeDB: A Quality-Aware Embedded Real-Time Database

    Publication Year: 2009, Page(s):108 - 117
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    QeDB is a database for data-intensive real-time applications running on flash memory-based embedded systems.Currently, databases for embedded systems are best effort,providing no guarantees on its timeliness and data freshness. Moreover, the existing real-time database (RTDB) technology can not be applied to these embedded databases since they hypothesize that the main memory of a system is large ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Failover for Real-Time Middleware with Passive Replication

    Publication Year: 2009, Page(s):118 - 127
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Supporting uninterrupted services for distributed soft real-time applications is hard in resource-constrained and dynamic environments, where processor or process failures and system workload changes are common. Fault-tolerant middleware for these applications must achieve high service availability and satisfactory response times for client applications. Although passive replication is a promising... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thermal-Aware Global Real-Time Scheduling on Multicore Systems

    Publication Year: 2009, Page(s):131 - 140
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    As the power density of modern electronic circuits increases dramatically, systems are prone to overheating. Thermal management has become a prominent issue in system design. This paper explores thermal-aware scheduling for sporadic real-time tasks to minimize the peak temperature in a homogeneous multicore system, in which heat might transfer among some cores. By deriving an ideally preferred spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive Speed Scheduling for Real-Time Tasks under Thermal Constraints

    Publication Year: 2009, Page(s):141 - 150
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Thermal management becomes a prominent issue in system design for both server systems and embedded systems. A system could fail if the peak temperature exceeds its thermal constraint. This research studies thermal-constrained scheduling for frame-based real-time tasks on a dynamic voltage/speed scaling system. Our objective is to design speed schedulers for real-time tasks by utilizing dynamic vol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-Aware Mapping of Probabilistic Applications onto Heterogeneous MPSoC Platforms

    Publication Year: 2009, Page(s):151 - 160
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Multiprocessor SoC platforms have been adopted for a wide range of high performance applications. Task assignment and processing unit allocation are key steps in the design of predictable and efficient embedded systems. Provided that the probability distributions and mutual exclusion conditions for executing applications are known a priori, this paper explores the mapping of tasks onto processing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Metric for Judicious Relaxation of Timing Constraints in Soft Real-Time Systems

    Publication Year: 2009, Page(s):163 - 172
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    For soft real-time systems, timing constraints are not as stringent as those in hard real-time systems: some constraint violations are permitted as long as the amount of violation is within a given limit. The allowed flexibility for soft real-time systems can be utilized to improve system's other quality-of-service (QoS) properties, such as energy consumption. One way to enforce constraint violati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.