By Topic

2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing

Date 11-13 April 2012

Filter Results

Displaying Results 1 - 25 of 32
  • ISORC 2012 [front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (610 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Message from the Symposium Co-chairs

    Publication Year: 2012, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (153 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-chairs

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Reviewers - ISORC 2012

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Providing Real-Time Scheduling for Mobile Agents in the JADE Platform

    Publication Year: 2012, Page(s):8 - 15
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    For a mobile agent with a time restriction to accomplish its mission, it is necessary for it to meet a deadline. However, in a distributed system there is the possibility of concurrency for the same resource. Treating such competition adequately is very important, especially in a real-time application scenario. In this article, we adopt an execution model in which mobile agents compete for the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Open-Source Flexible Scheduling Simulator for Real-Time Applications

    Publication Year: 2012, Page(s):16 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6576 KB) | HTML iconHTML

    There are several scheduling simulators to verify the behavior of real-time applications under different task scheduling algorithms. Current simulators cannot model the application accurately, and consequently the result of the simulation differs considerably from the actual behavior on a real computing system. This paper presents a scheduling simulator with application modeling capabilities for r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Event Handling for Distributed Real-Time Cyber-Physical Systems

    Publication Year: 2012, Page(s):23 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1484 KB) | HTML iconHTML

    Cyber-Physical Systems (CPS) provides a smart infrastructure connecting abstract computational artifacts with the physical world. This paper presents some challenges for developing distributed real-time Cyber-Physical Systems. The focus is on one particular challenge, namely event modelling in distributed real-time CPS. A Web-of-Things based CPS framework for event handling and processing is propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Support for Safety-Critical Java Scope Checks

    Publication Year: 2012, Page(s):31 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Memory management in Safety-Critical Java (SCJ) is based on time bounded, non garbage collected scoped memory regions used to store temporary objects. Scoped memory regions may have different life times during the execution of a program and hence, to avoid leaving dangling pointers, it is necessary to check that reference assignments are performed only from objects in shorter lived scopes to objec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment and Evaluation of Internet-Based Virtual Computing Infrastructure

    Publication Year: 2012, Page(s):39 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2411 KB) | HTML iconHTML

    Virtualisation is a prevalent technology in current computing. Among the many aspects of virtualisation, it can be employed to reduce hardware costs by server consolidation, implement "green computing" by reducing power consumption and as an underpinning process for cloud computing enabling the creation of a range of virtual networks and virtual supercomputers. This paper presents performance meas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Injection Method for Testing Dependable Web Service Systems

    Publication Year: 2012, Page(s):47 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1632 KB) | HTML iconHTML

    Testing Web services performance and their Fault Tolerance Mechanisms (FTMs) are crucial for the development of today's applications. Testing the performance and FTMs of composed service systems is hard to measure at design time because service instability is often caused by the nature of the network. Using a real internet environment for testing is difficult to set up and control. We have develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Energy-Efficient Hard Real-Time Scheduling for Component Oriented Systems

    Publication Year: 2012, Page(s):56 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    The energy efficiency becomes one of the most important concerns in mobile electronic systems design with mandatory requirements for low energy consumption, long battery life and low heat dissipation. Dynamic Power Management (DPM) and Dynamic Voltage and Frequency Scaling (DVFS or DVS) are two widely applied system level techniques to conserve system-wide power consumption. In the context of hard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Worst-Case Execution Time Based Optimization of Real-Time Java Programs

    Publication Year: 2012, Page(s):64 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Standard compilers optimize execution time for the average case. However, in hard real-time systems the worst-case execution time (WCET) is of primary importance. Therefore, a compiler for real-time systems shall include optimizations that aim to minimize the WCET. One effective compiler optimization is method in lining. It is especially important for languages, like Java, where small setter and g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schedulability Analysis Abstractions for Safety Critical Java

    Publication Year: 2012, Page(s):71 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    We present a compositional approach to schedulability analysis of safety-critical Java programs. We introduce a specification language in order to write abstract behavioural specifications regarding task execution-time and use of resources. Schedulability is checked on a model composed of the abstract specifications, possibly before any implementation, and as the specifications are implemented, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecting Health Management into Software Component Assemblies: Lessons Learned from the ARINC-653 Component Mode

    Publication Year: 2012, Page(s):79 - 86
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Complex real-time software systems require an active fault management capability. While testing, verification and validation schemes and their constant evolution help improve the dependability of these systems, an active fault management strategy is essential to potentially mitigate the unacceptable behaviors at run-time. In our work we have applied the experience gained from the field of Systems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Control Transmission of Medical Data over Cellular Networks Using Location Information

    Publication Year: 2012, Page(s):87 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Within the Fontane project medical data has to be transmitted using public cellular networks. The most frequently transmitted data has only weak timing requirements. But in particular cases we also transmit streaming data that typically has soft real-time requirements. Regardless of the real-time nature of transmission though, the data being transmitted has associated priorities. However, public c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-Oriented Robotic Swarm Systems: Model and Structuring Algorithms

    Publication Year: 2012, Page(s):95 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    In this paper, we consider the design issues in building robotic swarm systems as a service and develop a multi-level service-oriented robotic swarm (SORS) framework. First we consider how to support easy composition of services into workflows to accomplish user tasks. We identify a set of primitive virtual services for this purpose. Virtual services are not physical robotic swarm actions, but are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Constraint Mechanism for Dynamic Evolution of Service Oriented Systems

    Publication Year: 2012, Page(s):103 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1037 KB) | HTML iconHTML

    Service Oriented Architecture (SOA) is a new form of distributed software architecture, which promotes loose-coupling and coarse-granularity. It deploys, composes and calls application components in a distributed way on Internet. The dynamics of Internet environment poses challenge to dynamic service oriented system. The distributive Internet environment requires SOA to be more distributive and se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interface Refactoring in Performance-Constrained Web Services

    Publication Year: 2012, Page(s):111 - 118
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    This paper presents the development of REF-WS an approach to enable a Web Service provider to reliably evolve their service through the application of refactoring transformations. REF-WS is intended to aid service providers, particularly in a reliability and performance constrained domain as it permits upgraded 'non-backwards compatible' services to be deployed into a performance constrained netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network-Based Overallocation for Improved Energy-Efficiency in Real-Time Cloud Environments

    Publication Year: 2012, Page(s):119 - 126
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    This paper introduces a dynamic resource provisioning mechanism for over allocating the capacity of Cloud data centers based on customer resource utilization patterns. The proposed mechanism reduces the impact on Real-Time constraints while improvements on the overall energy-efficiency are sought. The main idea is to exploit the resource utilization patterns of each customer for smartly under allo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Evaluation of Global and Partitioned Semi-Fixed-Priority Scheduling Algorithms on Multicore Systems

    Publication Year: 2012, Page(s):127 - 134
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Nowadays multicore systems have been used in real-time applications such as robots. In robots, imprecise tasks such as image processing tasks are required to detect and avoid objects. However, existing real-time operating systems have evaluated multiprocessor real-time scheduling algorithms in Liu and Lay land's model and have not evaluated those in the imprecise computation model. This paper perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.