Proceedings Seventh International Conference on Real-Time Computing Systems and Applications

12-14 Dec. 2000

Filter Results

Displaying Results 1 - 25 of 72
  • Proceedings Seventh International Conference on Real-Time Computing Systems and Applications

    Publication Year: 2000
    Request permission for commercial reuse | |PDF file iconPDF (340 KB)
    Freely Available from IEEE
  • Testing embedded real-time systems

    Publication Year: 2000, Page(s):417 - 424
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (715 KB)

    An embedded real-time system consists of a number of components (processes) that run concurrently and communicate with each other under predefined timing constraints. The correctness of such systems is important, since they are used in an increasingly number of safety-critical systems. To improve the quality of these systems, two techniques can be used, namely verification of the specification and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):527 - 528
    Request permission for commercial reuse | |PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Probabilistic analysis of causal message ordering

    Publication Year: 2000, Page(s):409 - 413
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (380 KB)

    Causal message ordering (CMO) demands that messages directed to the same destinations must be delivered in an order consistent with their potential causality. In this paper, we present a modular decomposition of CMO, and evaluate the probability of breaking CMO by assuming two probabilistic models on message delays: exponential distribution and uniform distribution. These models represent the cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conformance testing of priority inheritance protocols

    Publication Year: 2000, Page(s):404 - 408
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (360 KB)

    The priority inversion problem was detected two decades ago (B.W. Lampson and D.D. Redell, 1980). The decisive ideas to cope with this problem were published one decade ago (1990). In the meantime, the vendors of operating systems and run-time systems have occupied this topic in providing certain protocols in order to avoid priority inversion. However, on closer inspection, there are considerable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frame packing in real-time communication

    Publication Year: 2000, Page(s):399 - 403
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (412 KB)

    A common computational model in distributed embedded systems is that the nodes exchange signals via a network. Most often, a signal represents the state of some physical device and has a signal size ranging from a single bit up to a few bytes. Furthermore, each signal typically has a deadline requirement. The communication networks used are often based on a broadcast bus where fixed or variable si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to a synthesis of formal and visual description techniques for the development of real-time reactive systems

    Publication Year: 2000, Page(s):491 - 497
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB)

    The paper presents notations for modeling real time reactive systems at different abstraction levels and provides mappings between these levels. The wide acceptance of UML in industry, as a unified notation applicable to the development of object based systems in a broad spectrum of domains, and the use of SDL for design analysis and verification in large scale applications have motivated us to us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Including user-defined timing exception support in FRTL

    Publication Year: 2000, Page(s):255 - 262
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    In previous papers, we have presented both a new framework for building flexible hard real-time systems (FRTS) and a corresponding run-time support system, called Flexible Real-Time Linux (FRTL). This paper presents how timing exception support can be integrated in both the framework and the run-time system. In particular, the paper proposes detecting and handling two types of timing exceptions: t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging protocol for remote cross development environment

    Publication Year: 2000, Page(s):394 - 398
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (440 KB)

    To develop the applications for Internet appliances, embedded software development tools need various host tools such as cross compilers and binary utilities as well as a remote debugger, an interactive shell, and real time resource monitors. The heavy host-target communication overhead and inconsistency caused by various host tools make target monitor programs more complex. The authors propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time systems development: from structured analysis to object-oriented design

    Publication Year: 2000, Page(s):486 - 490
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (388 KB)

    For their simplicity and maturity, structured methods are most widely used for modeling and analysis of real time systems. These methods, however, lack full support for those important features of real time systems like execution control, time constraint, safety, and fault tolerance. In addition, they are not formal enough for verification of system properties. To address their shortcomings, we pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parametric verification of the IEEE 1394a Root Contention protocol using LPMC

    Publication Year: 2000, Page(s):207 - 214
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (604 KB)

    This paper presents an application of mechanical verification using LPMC, a new version of the PMC model checker tool. The focus is on the modeling and the automatic verification of a protocol contained in the IEEE 1394a standard, the Root Contention protocol. The Root Contention protocol involves both real-time and randomization. As is shown, the study demonstrates the power of the new LPMC capab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a mechanical verification of real-time reactive systems modeled in UML

    Publication Year: 2000, Page(s):245 - 254
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (800 KB)

    This paper provides a verification methodology for UML-based real-time reactive system models. The verification process can be mechanized in PVS (Prototype Verification System). The motivation for this work comes from the wide acceptance of UML in industry, as a unified notation applicable to the development of object-based systems in a broad spectrum of domains, and the use of PVS for design anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE1394 OHCI device driver architecture for guarantee real-time requirement

    Publication Year: 2000, Page(s):389 - 393
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (540 KB)

    The paper proposes the architecture of an IEEE1394 device driver that supports the priority based queueing of packets and reduces the interrupt latency time in ISR (Interrupt Service Routine), thereby guaranteeing device driver level support for real time characteristics and improving the predictability of high priority applications. This architecture can accommodate the real time requirements of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Another formal proof for Deadline Driven Scheduler

    Publication Year: 2000, Page(s):481 - 485
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (320 KB)

    The paper presents another formal proof for the correctness of the Deadline Driven Scheduler (DDS). This proof is different from Zheng Yuhua and Zhou Chaochen's, although both are given in terms of duration calculus (DC) which provides abstraction for random preemption of processor. In the proof of Zheng and Zhou, the induction rules of the duration calculus are heavily applied, but the intuition ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explicit binding interface for supporting native ATM networks in a CORBA system

    Publication Year: 2000, Page(s):199 - 206
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (816 KB)

    This paper describes a native ATM support for CORBA. The system provides three advanced features. The first feature is to extend the CORBA interface to explicitly support network bandwidth reservation provided by ATM. The second feature is to support the negotiation between a client and a server to reserve network bandwidth. The last feature is to support multiple transport protocols simultaneousl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-server design for a distributed MPEG video system with streaming support and QoS control

    Publication Year: 2000, Page(s):160 - 165
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (544 KB)

    In this paper, we propose a new transmission scheme suitable for a multi-server video system. The proposed transmission scheme is priority-driven and assigns priorities to the video data according to the urgency and the nature of the MPEG video. With the software feedback mechanism, and according to the feedback, the system changes the feeding pattern or skips some unrecognizable frames in order t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eliminating annotations by automatic flow analysis of real-time programs

    Publication Year: 2000, Page(s):511 - 516
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (412 KB)

    There is an increasing demand for methods that calculate the worst case execution time (WCET) of real time programs. The calculations are typically based on path information for the program, such as the maximum number of iterations in loops and identification of infeasible paths. Most often, this information is given as manual annotations by the programmer. Our method calculates path information a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Admission control and resource allocation in a strictly priority based network

    Publication Year: 2000, Page(s):231 - 238
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1120 KB)

    Highly dynamic information environments that support military applications should be able to satisfy increasingly stringent demands on end-to-end QoS. As part of the DARPA AICE (Agile Information Control Environment) program, we have developed a middleware framework for admission control and resource allocation, for maximization of the end-to-end QoS for communication channels. Called Adaptive Inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic approach to switched Ethernet for real-time control applications

    Publication Year: 2000, Page(s):384 - 388
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (388 KB)

    Switched Ethernet combines Ethernet and ATM switching technology. The authors propose a probability based admission control algorithm over switched Ethernet to provide real time capability for control applications. The main contribution of the paper is providing an efficient means of estimating the queuing possibilities and the corresponding queuing delays inside the switch for periodic control sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved feasible shortest path real-time fault-tolerant scheduling algorithm

    Publication Year: 2000, Page(s):363 - 367
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (400 KB)

    Fault tolerance is an important aspect of real time computer systems, since timing constraints must not be violated. For a real time single processor environment, S. Ghosh et al. (1995) proposed two queue based scheduling techniques: an FSP (feasible shortest path) algorithm and LTH (linear time heuristics). Even though the FSP algorithm can produce optimal fault tolerant schedules, it is not prac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time transaction processing with partial validation at mobile clients

    Publication Year: 2000, Page(s):473 - 477
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    Conventional concurrency control protocols are inapplicable in mobile computing environments due to a number of constraints of wireless communication. In this paper, we design a protocol for processing mobile transactions. The protocol can detect data conflicts between transactions by a two-stage validation mechanism that is shared by the server and the mobile clients. In addition to relieving the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chopping and versioning real-time transactions to avoid remote blocking

    Publication Year: 2000, Page(s):93 - 101
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (772 KB)

    Locking protocols for hard real time systems have not generalized well from uniprocessors to multiprocessors. Bounding and reducing so-called “remote blocking” is widely recognized as an important problem for hard real time computing. We describe a combination of locking and versioning protocols adapted from database concurrency control, together with a “chopping” analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new queue discipline for various delay and jitter requirements in real-time packet-switched networks

    Publication Year: 2000, Page(s):191 - 198
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB)

    In scheduling data packets over the network, queue service disciplines are used to determine service priority, delay bound, jitter bound and bandwidth. Among them the Weighted Round Robin (WRR) technique has provided the most reasonable performance in guaranteeing both bandwidth and fairness requirements. WRR, however, fails to accommodate various end-to-end delays and jitter bounds. We propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time scheduling on multithreaded processors

    Publication Year: 2000, Page(s):155 - 159
    Cited by:  Papers (19)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    This paper investigates real-time scheduling algorithms on upcoming multithreaded processors. As evaluation testbed we introduce a multithreaded processor kernel which is specifically designed as core processor of a micro-controller or system-on-a-chip. Handling of external real-time events is performed through multithreading. Real-time threads are used as interrupt service threads (ISTs) instead ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dragon: soft real-time event delivering architecture for networked sensors and appliances

    Publication Year: 2000, Page(s):425 - 432
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (672 KB)

    Presents a new framework for constructing flexible event-driven systems for distributed networked devices and appliances, referred to as Dragon. Dragon enables constructing and modifying an event-driven system easily by visualizing distributed services which are handled in an integrated manner. The updating of the system is conducted immediately following a modification by Dragon. Dragon is built ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.