By Topic

2013 IEEE 34th Real-Time Systems Symposium

3-6 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 48
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (596 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2013, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2013, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Program Committees

    Publication Year: 2013, Page(s):xi - xiii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Keynote speech

    Publication Year: 2013, Page(s): xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    To meet the ever growing demands of Internet and cloud services, the data center industry is experiencing rapid expansion. Data centers consume billions of KWh electricity every year, and each can take hundreds of million dollars to build. Most data centers are conservatively provisioned and operated to achieve high reliability, resulting in wasted resources and high cost. In this talk, we take a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cache-Aware Compositional Analysis of Real-Time Multicore Virtualization Platforms

    Publication Year: 2013, Page(s):1 - 10
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    Multicore processors are becoming ubiquitous, and it is becoming increasingly common to run multiple real-time systems on a shared multicore platform. While this trend helps to reduce cost and to increase performance, it also makes it more challenging to achieve timing guarantees and functional isolation. One approach to achieving functional isolation is to use virtualization. However, virtualizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schedulability Analysis for a Mode Transition in Real-Time Multi-core Systems

    Publication Year: 2013, Page(s):11 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    To enable real-time systems to adapt to dynamically changing environments, update functionalities and/or accommodate those tasks migrated from other failed sub-systems, there have been a number of studies on making timing guarantees while accounting for change of parameters and addition/deletion of tasks. While most of them have dealt with "transition" protocols that delay next task releases or di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictable, Efficient System-Level Fault Tolerance in C^3

    Publication Year: 2013, Page(s):21 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1805 KB) | HTML iconHTML

    Predictable reliability is an increasingly important aspect of embedded and real-time systems. This includes the ability to recover from unknown faults in a manner that maintains system timing guarantees, even when these faults occur within system components. This paper presents the C3 system, which is the first system implementation we know of for predictable, system-level fault tolera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GPUSync: A Framework for Real-Time GPU Management

    Publication Year: 2013, Page(s):33 - 44
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    This paper describes GPUSync, which is a framework for managing graphics processing units (GPUs) in multi-GPU multicore real-time systems. GPUSync was designed with flexibility, predictability, and parallelism in mind. Specifically, it can be applied under either static-or dynamic priority CPU scheduling, can allocate CPUs/GPUs on a partitioned, clustered, or global basis, provides flexible mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks

    Publication Year: 2013, Page(s):45 - 56
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Motivated by the widespread use of spin locks in embedded multiprocessor real-time systems, the worst-case blocking in spin locks is analyzed using mixed-integer linear programming. Four queue orders and two preemption models are studied: (i) FIFO-ordered spin locks, (ii) unordered spin locks, (iii) priority-ordered spin locks with unordered tie-breaking, and (iv) priority-ordered spin locks with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GreenBag: Energy-Efficient Bandwidth Aggregation for Real-Time Streaming in Heterogeneous Mobile Wireless Networks

    Publication Year: 2013, Page(s):57 - 67
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1660 KB) | HTML iconHTML

    Modern mobile devices are equipped with multiple network interfaces, including 3G/LTE and WiFi. Bandwidth aggregation over LTE and WiFi links offers an attractive opportunity of supporting bandwidth-intensive services, such as high-quality video streaming, on mobile devices. However, achieving effective bandwidth aggregation in mobile environments raises several challenges related to deployment, l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mixed-Criticality Scheduling upon Varying-Speed Processors

    Publication Year: 2013, Page(s):68 - 77
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    A varying-speed processor is characterized by two execution speeds: a normal speed and a degraded speed. Under normal circumstances it will execute at its normal speed, conditions during run-time may cause it to execute more slowly (but no slower than at its degraded speed). The problem of executing an integrated workload, consisting of some more important components and some less important ones, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demand-Based Scheduling of Mixed-Criticality Sporadic Tasks on One Processor

    Publication Year: 2013, Page(s):78 - 87
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Strategies that artificially tighten high-criticality task deadlines in low-criticality behaviors have been successfully employed for scheduling mixed-criticality systems. Although efficient scheduling algorithms have been developed for implicit deadline task systems, the same is not true for more general sporadic tasks. In this paper we develop a new demand-based schedulability test for such gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring of Workload Arrival Functions for Mixed-Criticality Systems

    Publication Year: 2013, Page(s):88 - 96
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Integrating applications with different safety requirements on a common platform requires either certification of all applications to the highest safety level or "sufficient independence" among them. As the former typically is too costly, isolation mechanisms, such as monitoring, are key in the design of mixed-criticality systems. We regard monitoring of activation patterns of real-time applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Management of Satellite Power Systems

    Publication Year: 2013, Page(s):97 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Satellites are indispensable for broadcast, weather forecast, navigation, and many other applications, but their design entails a number of stringent requirements, such as limited space and weight, impossible/costly online repairs, severe radiation, and a wide range of temperature they have to withstand. These requirements can only be met by an effective, robust co-design of physical and computing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimizing Building Electricity Costs in a Dynamic Power Market: Algorithms and Impact on Energy Conservation

    Publication Year: 2013, Page(s):107 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    Energy is a global concern and the electricity bills nowadays are leading to unprecedented costs. Electricity price is market-based and dynamic. In this paper, we investigate how to cut the electricity bills of commercial buildings in a dynamic power market. The building thermal systems (e.g., air-conditioning), which dominate electricity bills, has a special property of thermal storage, i.e., the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Adaptive Reconfiguration to Optimize Energy Efficiency in Large-Scale Battery Systems

    Publication Year: 2013, Page(s):118 - 127
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    Large-scale battery packs with hundreds/thousands of battery cells are commonly adopted in many emerging cyber-physical systems such as electric vehicles and smart micro-grids. For many applications, the load requirements on the battery systems are dynamic and could significantly change over time. How to resolve the discrepancies between the output power supplied by the battery system and the inpu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Timing Analysis of Application and Operating Systems Code

    Publication Year: 2013, Page(s):128 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Real-time embedded software often runs on a supervisory operating system software layer on top of a modern processor. Thus, to give timing guarantees on the execution time and response time of such applications, one needs to consider the timing effects of the operating system, such as system calls and interrupts - over and above modeling the timing effects of micro-architectural features such as p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RT-WiFi: Real-Time High-Speed Communication Protocol for Wireless Cyber-Physical Control Applications

    Publication Year: 2013, Page(s):140 - 149
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (731 KB) | HTML iconHTML

    Applying wireless technologies in control systems can significantly enhance the system mobility and reduce the deployment and maintenance cost. Existing wireless technology standards, however either cannot provide real-time guarantee on packet delivery or are not fast enough to support high-speed control systems which typically require 1kHz or higher sampling rate. Nondeterministic packet transmis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Continuous Stream Model of Computation for Real-Time Control

    Publication Year: 2013, Page(s):150 - 159
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    This paper presents a new Model of Computation (MoC) for real-time tasks used in control systems. This new model, named continuous stream task model, relaxes some of the constraints imposed by the traditional hard and soft real-time task models. A key advantage of the model is the possibility to easily analyse the probabilistic evolution of the delays. This leads to an easy formalisation of necess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.