By Topic

Real-Time Systems, 1998. Proceedings. 10th Euromicro Workshop on

Date 17-19 June 1998

Filter Results

Displaying Results 1 - 25 of 33
  • Proceeding. 10th EUROMICRO Workshop on Real-Time Systems (Cat. No.98EX168)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (242 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s): 265
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Transaction processing in wireless distributed real-time databases

    Publication Year: 1998, Page(s):214 - 220
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The use of portable computers with a wireless connection to distributed databases will become as popular as the use of mobile phones in the near future. The rapidly advancing technology in this area has initiated new research areas and challenging research questions. One new area is the support of real-time database systems with a wireless network. The authors have built a model with sufficient de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic disk bandwidth management and metadata pre-fetching in a real-time file system

    Publication Year: 1998, Page(s):204 - 213
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The authors focus on two practical considerations that arise in the design of a real-time file system. Firstly, disk bandwidth management should be dynamic, which in turn would allow a QoS manager to dynamically reallocate disk bandwidth to running applications based on their changing needs. Secondly, real-time access to file system data structures should be deterministic, in order to avoid unexpe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous data sharing in multiprocessor real-time systems using process consensus

    Publication Year: 1998, Page(s):2 - 9
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    The paper presents an approach to implementing fully asynchronous reader/writer mechanisms which addresses the problems of priority inversion and blocking among tasks within multiprocessor real time systems. The approach is conceived from the concept of process consensus that the writer and the reader come to an agreement on accessing the shared data before proceeding to carry out their respective... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic detection of software failures: issues and experience

    Publication Year: 1998, Page(s):245 - 252
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    The functionality of many real-time systems depends critically on their software. It is important to know whether their software operates correctly or whether failures are occurring. This would help system operators take corrective actions before minor problems escalate into major disruptions. The paper considers one approach to automatic detection of software failures called supervision. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transaction-based temporal data model that supports prediction in real-time databases

    Publication Year: 1998, Page(s):197 - 203
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The authors propose database support for large sets of temporal, real-time data. Prediction models are supported: transactions can write data items to the database that have been “measured in the future”. Therefore, it is necessary to allow multiple instances of the same data item, with different times of measurement. This requires larger storage requirements, but can also be used for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A non-temporized approach for temporized analysis

    Publication Year: 1998, Page(s):154 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Real-time critical systems require extensive analysis. The potentially considerable damage caused by failures of real-time critical systems justify the use of expensive verification techniques, such as timed reachability analysis. Unfortunately the cost of timed reachability analysis inhibits its systematic application at the early stages of development, when long verification sessions could slow ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schedulability analysis for mode changes in flexible real-time systems

    Publication Year: 1998, Page(s):172 - 179
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    One important requirement of many real-time systems is the ability to undergo several mutually exclusive modes of operation. By means of a mode change the system changes its functionality over time, thus being able to adapt to changing environmental situations. In order to successfully include mode changes in real-time systems, a mode change protocol with well known real-time behaviour is necessar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ETHNOS-a real time programming environment for robotic systems

    Publication Year: 1998, Page(s):238 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    A great number of applications for robotic systems and, in particular, for mobile vehicles, require the ability to handle highly dynamic environments such as those typically involving human activity. In order to operate correctly, the systems are subject to many different timing constraints coming from many different sources: hardware, software and human intervention. In embedded systems, these re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of global and partitioning schemes for scheduling rate monotonic tasks on a multiprocessor

    Publication Year: 1998, Page(s):188 - 195
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The authors study GRMS, a global scheduling scheme for rate monotonic tasks on a multiprocessor. Several admission control algorithms for GRMS are presented, both for hard and soft real-time tasks. The average performance of these admission control algorithms is compared with the performance of known partitioning schemes. The result of these comparisons outlines some situations where one scheme is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiency evaluation of a time-triggered architecture for vehicle body-electronics

    Publication Year: 1998, Page(s):62 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    The growing demand for more comfort and safety as well as less energy consumption of vehicles has lead to intractable complexity, wiring harness and high cost of vehicle body electronic systems. To cope with these problems, a time triggered architecture based on TTP/A (time triggered protocol for automotive applications) has been developed. This architecture provides timeliness, predictability, co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling algorithm for hard real-time communication in demand priority network

    Publication Year: 1998, Page(s):45 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    The paper addresses the problem of scheduling periodic messages in demand priority network standardized by IEEE 802.12 Committee. As regards the real time property of the demand priority network, unnecessary blocking time due to its round robin based MAC protocol may cause periodic messages to miss their hard deadlines and result in low schedulability of periodic messages. We propose a new message... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CyPhone-experimenting mobile real-time telepresence

    Publication Year: 1998, Page(s):10 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1568 KB)

    Advances in multimedia, virtual reality, and immersive environments have expanded human computer interaction beyond text and vision to include touch, gestures, voice and 3D sound. Although there exist well developed single modalities for communication, we do not really understand the general problem of designing integrated multimodal systems. Recent advances in mobile communication based on picoce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XTG-an engineering approach to modelling and analysis of real-time systems

    Publication Year: 1998, Page(s):88 - 97
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The paper addresses the ongoing research on verification and simulation of real time systems at SEPC. The approach taken is an engineering approach dedicated to tool development aiming at a wider dissemination of formal methods and techniques in industrial application. The tool environment under construction TVS, is dedicated to formal verification and simulation of real time systems. TVS comprise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facilitating worst-case execution times analysis for optimized code

    Publication Year: 1998, Page(s):146 - 153
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    The authors present co-transformation, a novel approach to the mapping of execution information from the source code of a program to the object code for the purpose of worst-case execution time (WCET) analysis. Their approach is designed to handle the problems introduced by optimizing compilers, i.e. that the structure of the object code is very different from the structure of the source code. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the scheduling of real-time multihop packet-switching networks

    Publication Year: 1998, Page(s):123 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    The purpose of the paper is to present a method to validate tentative routes to establish calls with end-to-end timing-constraints in a multihop packet-switching network. Timing release counters are proposed as a mechanism to guarantee that intervals between consecutive releases of messages of the same call are not shorter than the call period. A comparative evaluation of the proposed timing relea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool-supported hierarchical design of distributed real-time systems

    Publication Year: 1998, Page(s):222 - 229
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    The authors demonstrate the usage of a formal description technique for real-time systems called PLC-Automaton by applying this method to a real-world case study. To this end they use the tool which was built for PLC-Automata. This tool, called MOBY/PLC, provides simulation and verification methods to validate a design. Furthermore, the design can be translated into executable source code for real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of task scheduling and file services in the safety-critical system MELODY

    Publication Year: 1998, Page(s):18 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The distributed operating system MELODY, was developed for supporting safety critical applications in unpredictable environments. Requirements for safety and reliability have to be accommodated, as well as things like real time responsiveness. All features have to be adaptive. While developing MELODY through a number of different phases, we created a heuristic experimental, performance-relate meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteeing end-to-end deadlines in distributed client-server applications

    Publication Year: 1998, Page(s):163 - 171
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    The paper presents a scheme for guaranteeing the scheduling of real-time computations in a distributed environment. The authors propose a process model where only true (local or end-to-end) deadlines need to be specified. They assume all local interactions among processes are based on shared memory communication, protected by priority ceiling semaphores. Remote interactions are client-server block... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOOR-an approach for reusing and retrieving domain-oriented components

    Publication Year: 1998, Page(s):230 - 237
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1276 KB)

    The paper describes an approach to system development based on domain analysis and software architectures. The approach combines developments for reuse and development with reuse together and offers an integrated process which is supported by an interactive tool for modelling and retrieving reusable assets. Reusable objects are identified within narrow application scopes and relationships among th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-line schedulers for pinwheel tasks using the time-driven approach

    Publication Year: 1998, Page(s):180 - 187
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    Pinwheel scheduling algorithms can be used to produce distance-constrained real-time system schedules where the temporal distance between any two consecutive completions of a task must be less than a pre-defined time interval. A pinwheel schedule can be generated off-line and executed cyclically. Such an approach provides a good predictability and allows for off-line schedule optimization. However... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic multihop radio on the top of 802.11 MAC

    Publication Year: 1998, Page(s):71 - 78
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The standardisation of wireless local area network (WLAN) has been active over the past couple of years (1996-98). One of the positive results is the vendor plans of providing IEEE 802.11 conforming product lines. The 802.11 is a compelling platform to also perform time bounded communication if some of its inherent non determinism can be overcome. The paper studies the possibilities of applying th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using exact feasibility tests for allocating real-time tasks in multiprocessor systems

    Publication Year: 1998, Page(s):53 - 60
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    The paper introduces improvements in partitioning schemes for multiprocessor real time systems which allow higher processor utilization and enhanced schedulability by using exact feasibility tests to evaluate the schedulability limit of a processor. The paper analyzes how to combine these tests with existing bin packing algorithms for processor allocation and provides new variants which are exhaus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hidden time model for specification and verification of embedded systems

    Publication Year: 1998, Page(s):98 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Embedded systems are application specific digital systems that are usually designed using a microprocessor, along with a set of programmable hardware and software components. Since these systems are real time in nature, specification of temporal constraints is a key issue. We have recently proposed the CFSMcharts language for component based specification of these systems. However this proposal ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.