SYNCHRONIZATION IN REAL-TIME SYSTEMS. A Priority Inheritance Approach

Size: px
Start display at page:

Download "SYNCHRONIZATION IN REAL-TIME SYSTEMS. A Priority Inheritance Approach"

Transcription

1 SYNCHRONIZATION IN REAL-TIME SYSTEMS A Priority Inheritance Approach

2 THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE REAL-TIME SYSTEMS Consulting Editor John A. Stankovic REAL TIME UNIX SYSTEMS: Design and Application Guide, B. Furht, D. Grostick, D. Gluch, G. Rabbat, J. Parker, M. McRoberts, ISBN: FOUNDATIONS OF REAL TIME COMPUTING: Scheduling and Resource Management, A. M. van Tilborg, G. M. Koob ISBN: FOUNDATIONS OF REAL TIME COMPUTING: Formal Specifications and Methods, A. M. van Tilborg, ISBN: CONSTRUCTING PREDICTABLE REAL TIME SYSTEMS, W. A. Halang, A. D. Stoyenko ISBN:

3 SYNCHRONIZATION IN REAL-TIME SYSTEMS A Priority Inheritance Approach by Ragunathan R2\ikumar IBM, Thomas J. Watson Research Center ~. " SPRINGER SCIENCE+BUSINESS MEDIA, LLC

4 Library of Congress Cataloging-in-Publieation Data Rajkumar, Ragunathan. Synchronization in real-time systems : a priority inheritance approach / by Ragunathan Rajkumar. p. cm. -- (The Kluwer international series in engineering and computer science ; 151. Real-time systems) Includes bibliographical references and index. ISBN l ISBN (ebook) DOI / Real-time data processing. 1. Title. II. Series: Kluwer international series in engineering and computer science ; SECS 151. III. Series: Kluwer international series in engineering and computer science. Real-time systems. QA76.54.R '.33--dc CIP Copyright e 1991 Springer Science+Business Media New York Originaily published by Kluwer Academic Publishers in 1991 Softcover reprint ofthe hardcover Ist edition 1991 AII rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, mechanical, photo-copying, recording, or otherwise, without the prior written permission of the publisher, Springer Science+ Business Media, LLC. Printed an acid-free paper.

5 To my Parents

6 Table of Contents List of Figures List of Tables Preface Acknowledgments xi xiii xv xvii Chapter One: Introduction Real-Time Systems Scheduling in Real-Time Systems Related Work Scope of This Book Approach Taken Organization ofthe Book 12 Chapter Two: Real-Time Synchronization in Uniproces- 15 sors 2.1 Introduction Priority Inheritance Protocols The Basic Priority Inheritance Protocol The Definition of The Basic Protocol Implementing the Basic Priority Inheritance Protocol Properties of the Basic Priority Inheritance Protocol The Priority Ceiling Protocol Overview Definition of the Priority Ceiling Protocol An Implementation of the Priority Ceiling Protocol The Properties of The Priority Ceiling Protocol 34

7 viii 2.5 The Semaphore Control Protocol Definition of the Semaphore Control Protocol Schedulability Analysis of Priority Inheritance Protocols The Impact of Priority Inversion on Schedulability Determination of Bi for SCP Determination of Bi for PCP Determination of Bi for the Basic Inheritance Protocol Extensions to the Priority Inheritance Protocols Performance of the Priority Inheritance Protocols Deadlock Avoidance Protocol Comparison Under Transient Overloads Summary of Results of Experimental Studies Summary 58 Chapter Three: Synchronization in Multiple Processor 61 Systems 3.1 Introduction Synchronization in Multiple Processor Systems Typical System Configuration Static Binding vs. Dynamic Binding The Concept of Remote Blocking Assumptions and Notation Global and Local Priority Ceilings The Distributed Priority Ceiling Protocol Synchronization Processors Normal Execution Priority ofa GCS Terminology Illustration Implementation Considerations Illustration ofthe Distributed Protocol The Definition of the Distributed Priority Ceiling Protocol Effects of Deferred Execution Properties of the Distributed Priority Ceiling Protocol Schedulability Analysis A Schedulability Analysis Example Task Allocation The Multiprocessor Priority Ceiling Protocol Differences with the Distributed Protocol The Definition of the Multiprocessor Priority Ceiling 99 Protocol Determination of Task Blocking Times Schedulability Analysis 108

8 ix A Schedulability Analysis Example Comparison of Multiple Processor Synchronization Protocols Implementation Considerations Variations in the Multiprocessor Priority Ceiling Protocol Summary 11 7 Chapter Four: Distributed Real-Time Databases Introduction Motivation Related Work Real-Time Concurrency Control Issues The Priority Inversion Problem The Read-Write Priority Ceiling protocol Extending the rw_priority Ceiling Protocol Distributed Database Issues Summary 139 Chapter Five: Conclusion Summary of Results Directions for Future Research Concluding Remarks 147 Appendix A: Computing Bi For The Basic Inheritance 149 Protocol Appendix B: Notation Used 157 References 161 Index 169

9 List of Figures Figure 1-1: An Embedded Real-Time System 3 Figure 2-1: Sequence of Events described in Example Figure 2-2: Sequence of Events described in Example Figure 2-3: Sequence of Events described in Example Figure 3-1: A Typical Multiple Processor System Configuration 63 Figure 3-2: Remote Processor Blocking: Example Figure 3-3: Remote Processor Blocking: Example Figure 3-4: Task and Semaphore Allocation of Example Figure 3-5: Task and Semaphore Allocation of Example Figure 3-6: The Sequence of Events described in Example Figure 3-7: Liu and Layland's worst case 83 Figure 3-8: The new worst case with deferred execution 84 Figure 3-9: The Task Allocation Procedure of Example Figure 3-10: Task and Semaphore Allocation of Example Figure 3-11: Sequence of events described in Example Figure 4-1: The Pseudo-Code For a Tracking Transaction 123 GlobaC View. Figure 4-2: Sequence of Events described in Example Figure A-I: Simpletons 150 FigureA-2: Final Search Tree 151 FigureA-3: Maximum Weighted Path 152 FigureA-4: Search Tree for Maximum Transformed Weighted 153 Path FigureA-5: The Search Tree Dual for Maximum Transformed 155 Weighted Path

10 List of Tables Table 2 1: Breakdown Utilization for Different Protocols with 5 51 Semaphores Table 2 2: Breakdown Utilization for Different Protocols with Semaphores Table 2 3: Breakdown Utilizations from Various Ada Run 52 Time Systems Table 2 4: Deadlock A voidance Properties of Different 56 Protocols Table 2 5: Relative Deadline Misses for Different Protocols 57 with 5 semaphores Table 2 6: Deadline Misses for Different Protocols wi semaphores Table 3 1: The Priority Ceilings of Semaphores in Example Table 3 2: The Normal Execution Priorities of Critical Sections 78 in Example 3.4 Table 3 3: The Parameters of Task Set in Example Table 3 4: The Blocking Factors for Each Task in Example Table 3 5: The Schedulability Test Parameters for Each 91 Processor of Example 3.4 Table 3 6: The Priority Ceilings of Semaphores in Example Table 3 7: Normal Execution Priorities of Critical Sections in 100 Example 3.7 Table 3 8: The Execution Priorities of Global Critical Sections 110 for Section Table 3 9: The Blocking Factors for Each Task in Section Table 3 10: The Schedulability Test Parameters for Each 113 Processor of Example 3.4

11 Preface Real-time computing systems are vital to a wide range of applications. For example, they are used in the control of nuclear reactors and automated manufacturing facilities, in controlling and tracking air traffic, and in communication systems. In recent years, real-time systems have also grown larger and become more critical. For instance, advanced aircraft such as the space shuttle must depend heavily on computer systems [Carlow 84]. The centralized control of manufacturing facilities and assembly plants operated by robots are other examples at the heart of which lie embedded real-time systems. Military defense systems deployed in the air, on the ocean surface, land and underwater, have also been increasingly relying upon real-time systems for monitoring and operational safety purposes, and for retaliatory and containment measures. In telecommunications and in multi-media applications, realtime characteristics are essential to maintain the integrity of transmitted data, audio and video signals. Many of these systems control, monitor or perform critical operations, and must respond quickly to emergency events in a wide range of embedded applications. They are therefore required to process tasks with stringent timing requirements and must perform these tasks in a way that these timing requirements are guaranteed to be met. Real-time scheduling algorithms attempt to ensure that system timing behavior meets its specifications, but typically assume that tasks do not share logical or physical resources. Since resource-sharing cannot be eliminated, synchronization primitives must be used to ensure that resource consistency constraints are not violated. Unfortunately, existing mechanisms for achieving task synchronization can lead to uncontrolled priority inversion, a situation in which a higher priority job is blocked by lower priority jobs for an indefinite period of time. Unless the priority inversion problem is addressed adequately, scheduling algorithms can be of little use in realtime systems.

12 xvi Goals of This Book This book studies the principles of task synchronization in real-time systems by investigating the impact of synchronization delays on timing constraints. It develops a comprehensive set of techniques for synchronizing real-time tasks on uniprocessors, shared memory multiprocessors, distributed systems and distributed real-time databases. In particular, we investigate the class of priority inheritance protocols that solve the unbounded blocking problem, which is a generalization of the priority inversion problem. We show that there exist efficient priority inheritance protocols on uniprocessors. Since synchronization is essentially a serializing activity, the durations of blocking on shared resources become prolonged in the context of multiprocessors and distributed systems. We develop priority inheritance protocols for use on multiprocessors and distributed systems which bound the blocking duration of a task waiting for globally shared resources. We also extend the priority inheritance protocols to distinguish between the read and write semantics of locks in real-time databases. We show that compatible locks are not necessarily useful in real-time databases, but our protocol shall exploit such lock compatibility when it enhances guaranteed performance. This protocol can be extended to decomposable distributed real-time databases as well. Our primary focus in this book is upon the delay introduced by the sharing of resources. The intended goal is to bound this delay, reduce it as much as possible and account for it in the scheduling analysis. However, it is important to note that bounding the delay caused by task synchronization is not an end in itself. First and foremost, the system must be amenable to scheduling analysis in the absence of resource-sharing. The bounded delay due to resource-sharing serves only to approximate the idealized independent task scheduling model, with the net effect of making the realtime system predictable.

13 Acknowledgments Without the help and support of several people at Carnegie Mellon University, IBM Research and elsewhere, this book would not have become possible. If I now believe that I am capable of doing some research, lowe it to Dr. Lui Sha, my mentor, who introduced me to the intriguing domain of research, and taught me to question basic assumptions. Discussions, technical and otherwise, that I have had with him have always been rewarding. Thank you for everything, Lui. My eternal gratitude is also due Prof. John Lehoczky, for his incisive questioning every step of the way. His deep insight and ability to formulate research problems have never failed to amaze me. In fact, much of the work presented in this book was done with Dr. Sha and Prof. Lehoczky. My sincere thanks to Prof. Jay Strosnider, an office-mate at first, a friend then and my advisor finally! It was a pleasure to bounce ideas off him, and his amicable personality made my stay at CMU all the more enjoyable. I am grateful to Prof. Dan Siewiorek for adopting me as his student under (my) difficult circumstances, and for all the pieces of advice he has given me before and after graduation. Finally, I sincerely thank my manager at IBM Research, Dr. Robert Iannucci, and the IBM Research management who let me steal time away from my work to do this book. I also thank the Advanced Real-time Technology (ART) project members at CMU for creating the wonderful environment where work was fun. In particular, I thank Dr. Hide Tokuda, Brinkley Sprunt, Dave Kirk, Tom Marchok and especially Joan Maddamma. Dr. Andre van Tilborg was instrumental in getting me into this group. Technical discussions. at the Software Engineering Institute with the RTSIA'ns Dr. John Goodenough, Mark Borger, Mark Klein, Bob Page and Tom Ralya were always very informative. Prof. Krithi Ramamritham presented the synchronization protocol on shared memory multiprocessors at the Distributed Systems Conference on my behalf, and contributed to the development of the Semaphore Control Protocol. Mark Borger implemented the uniprocessor

14 xviii protocols on an Ada run-time system for a 68K-target and collected the test data. Mark Klein and Mark Borger pointed out that the deadline avoidance property of the priority ceiling protocol is superior to that of the ceiling semaphore protocol. The B52's (Tom Marchok, Ron Mraz, CJ Paul and Brinkley Sprunt) deserve special mention for the light-hearted office atmosphere. I also thank Bala Kumar, Gandhi Chinnadurai, Salemites, and the CMU and Pittsburgh folks who contributed more than I can acknowledge. But for my wonderful undergraduate years at PSG Tech, I would be a very different person now and none of this would have ever happened. My thanks to the entire batch of '79-'84 and in particular to all my ECE-mates. I am extremely grateful for the love, understanding, support and extreme patience shown all along by my wife Revathi. She taught me that life is much more than working at a dumb terminal. And my love goes to Vikram, for all his smiles, playfulness and curiosity. Without him being born, this book would have been written much sooner. It was certainly worth it! And thanks to my brother Mohan Kumar and sister Roop Kala for everything they had to offer during my many years at and away from home. Finally, I am grateful to my parents, especially to my late father who built in me the resolve to fight for what I wanted, and to my mother who was always there. Their relentless encouragement was perhaps the single most influential factor in my education since childhood. I dedicate this book to them.

15 SYNCHRONIZATION IN REAL-TIME SYSTEMS A Priority Inheritance Approach

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida

More information

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE

PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE Yau-Tsun Steven Li Monterey Design Systems, Inc. Sharad Malik Princeton University ~. " SPRINGER

More information

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs Vaughn Betz Jonathan Rose Alexander Marquardt

More information

THE VERILOG? HARDWARE DESCRIPTION LANGUAGE

THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOGf HARDWARE DESCRIPTION LANGUAGE by Donald E. Thomas Carnegie Mellon University and Philip R. Moorby Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS

More information

Fundamentals of Operating Systems. Fifth Edition

Fundamentals of Operating Systems. Fifth Edition Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business

More information

MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING

MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING MINING VERY LARGE DATABASES WITH PARALLEL PROCESSING The Kluwer International Series on ADVANCES IN DATABASE SYSTEMS Series Editor Ahmed K. Elmagarmid Purdue University West Lafayette, IN 47907 Other books

More information

The Priority Ceiling Protocol: A Method for Minimizing the Blocking of High-Priority Ada Tasks

The Priority Ceiling Protocol: A Method for Minimizing the Blocking of High-Priority Ada Tasks Special Report CMU/SEI-88-SR-4 The Priority Ceiling Protocol: A Method for Minimizing the Blocking of High-Priority Ada Tasks John B. Goodenough Lui Sha March 1988 Special Report CMU/SEI-88-SR-4 March

More information

INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach

INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach INTRUSION DETECTION IN DISTRIBUTED SYSTEMS An Abstraction-Based Approach Library of Congress Cataloging-in-Publication ISBN 978-1-4613-5091-0 ISBN 978-1-4615-0467-2 (ebook) DOI 10.1007/978-1-4615-0467-2

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

WIRELESS ATM AND AD-HOC NETWORKS. Protocols and Architectures

WIRELESS ATM AND AD-HOC NETWORKS. Protocols and Architectures WIRELESS ATM AND AD-HOC NETWORKS Protocols and Architectures WIRELESS ATM AND AD-HOC NETWORKS Protocols and Architectures C-K Toh, Ph.D. University of Cambridge Cambridge, United Kingdom SPRINGER-SCIENCE+BUSINESS

More information

Dedication. To the departed souls of my parents & father-in-law.

Dedication. To the departed souls of my parents & father-in-law. Abstract In this thesis work, a contribution to the field of Formal Verification is presented innovating a semantic-based approach for the verification of concurrent and distributed programs by applying

More information

Temporal Protection in Real-Time Operating Systems. Abstract

Temporal Protection in Real-Time Operating Systems. Abstract Temporal Protection in Real-Time Operating Systems Cliff Mercer*, Ragunathan Rajkumar+ and Jim Zelenka* *Department of Computer Science +Software Engineering Institute Carnegie Mellon University Pittsburgh,

More information

A Structured Programming Approach to Data

A Structured Programming Approach to Data A Structured Programming Approach to Data Derek Coleman A Structured Programming Approach to Data Springer-Verlag New York Derek Coleman Department of Computation Institute of Science Technology University

More information

Building Custom Tasks for SQL Server Integration Services

Building Custom Tasks for SQL Server Integration Services Building Custom Tasks for SQL Server Integration Services Andy Leonard Building Custom Tasks for SQL Server Integration Services Andy Leonard Farmville, Virginia, USA ISBN-13 (pbk): 978-1-4842-2939-2 ISBN-13

More information

Real-Time Scheduling of Sensor-Based Control Systems

Real-Time Scheduling of Sensor-Based Control Systems In Proceedings of Eighth IEEE Workshop on Real-Time Operatings Systems and Software, in conjunction with 7th IFAC/IFIP Workshop on Real-Time Programming, Atlanta, GA, pp. 44-50, May 99. Real-Time Scheduling

More information

Temporal Protection in Real-Time Operating Systems. Abstract

Temporal Protection in Real-Time Operating Systems. Abstract Temporal Protection in Real-Time Operating Systems Cliff Mercer 1, Ragunathan Rajkumar 2 and Jim Zelenka 1 1 Department of Computer Science 2 Software Engineering Institute Carnegie Mellon University Pittsburgh,

More information

Programming with POSIX Threads

Programming with POSIX Threads Programming with POSIX Threads David R. Butenhof :vaddison-wesley Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sidney Tokyo Singapore Mexico City Contents List of

More information

Topological Structure and Analysis of Interconnection Networks

Topological Structure and Analysis of Interconnection Networks Topological Structure and Analysis of Interconnection Networks Network Theory and Applications Volume 7 Managing Editors: Ding-Zhu Du, University of Minnesota, U.S.A. and Cauligi Raghavendra, University

More information

ECE519 Advanced Operating Systems

ECE519 Advanced Operating Systems IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor

More information

Implementing Sporadic Servers in Ada

Implementing Sporadic Servers in Ada Technical Report CMU/SEI-90-TR-6 ESD-90-TR-207 Implementing Sporadic Servers in Ada Brinkley Sprunt Lui Sha May 1990 Technical Report CMU/SEI-90-TR-6 ESD-90-TR-207 May 1990 Implementing Sporadic Servers

More information

Theory of Automatic Robot Assembly and Programming

Theory of Automatic Robot Assembly and Programming Theory of Automatic Robot Assembly and Programming Theory of Automatic Robot Assembly and Programming Bartholomew o. Nnaji Professor and Director Automation and Robotics Laboratory Department of Industrial

More information

Priority Inversion in Multi Processor Systems due to Protected Actions

Priority Inversion in Multi Processor Systems due to Protected Actions Priority Inversion in Multi Processor Systems due to Protected Actions Gustaf Naeser Department of Computer Science and Engineering, Mälardalen University, Sweden gustaf.naeser@mdh.se The use of multiple

More information

A Developer s Guide to the Semantic Web

A Developer s Guide to the Semantic Web A Developer s Guide to the Semantic Web von Liyang Yu 1. Auflage Springer 2011 Verlag C.H. Beck im Internet: www.beck.de ISBN 978 3 642 15969 5 schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

More information

Loop Tiling for Parallelism

Loop Tiling for Parallelism Loop Tiling for Parallelism THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE LOOP TILING FOR PARALLELISM JINGLING XUE School of Computer Science and Engineering The University of New

More information

Schedulability with resource sharing. Priority inheritance protocol Priority ceiling protocol Stack resource policy

Schedulability with resource sharing. Priority inheritance protocol Priority ceiling protocol Stack resource policy Schedulability with resource sharing Priority inheritance protocol Priority ceiling protocol Stack resource policy 1 Lecture overview We have discussed the occurrence of unbounded priority inversion We

More information

INVERSE PROBLEMS IN GROUNDWATER MODELING

INVERSE PROBLEMS IN GROUNDWATER MODELING INVERSE PROBLEMS IN GROUNDWATER MODELING Theory and Applications of Transport in Porous Media Series Editor: Jacob Bear, Technion - Israel Institute of Technology, Haifa, Israel Volume 6 The titles published

More information

Algorithm Collections for Digital Signal Processing Applications Using Matlab

Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab E.S. Gopi National Institute of Technology, Tiruchi,

More information

TECHNICAL TRANSLATION

TECHNICAL TRANSLATION TECHNICAL TRANSLATION Technical Translation Usability Strategies for Translating Technical Documentation JODY BYRNE University of Sheffield, UK A C.I.P. Catalogue record for this book is available from

More information

Software Development for SAP R/3

Software Development for SAP R/3 Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example

More information

RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS

RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS RETARGETABLE CODE GENERATION FOR DIGITAL SIGNAL PROCESSORS Rainer LEUPERS University of Dortmund Department of Computer Science Dortmund, Germany

More information

Practical Amazon EC2, SQS, Kinesis, and S3

Practical Amazon EC2, SQS, Kinesis, and S3 Practical Amazon EC2, SQS, Kinesis, and S3 A Hands-On Approach to AWS Sunil Gulabani Practical Amazon EC2, SQS, Kinesis, and S3: A Hands-On Approach to AWS Sunil Gulabani Ahmedabad, Gujarat, India ISBN-13

More information

Scheduling Sporadic and Aperiodic Events in a Hard Real-Time System

Scheduling Sporadic and Aperiodic Events in a Hard Real-Time System Technical Report CMU/SEI-89-TR-11 ESD-TR-89-19 Scheduling Sporadic and Aperiodic Events in a Hard Real-Time System Brinkley Sprunt Lui Sha John Lehoczky April 1989 Technical Report CMU/SEI-89-TR-11 ESD-TR-89-19

More information

Energy Efficient Microprocessor Design

Energy Efficient Microprocessor Design Energy Efficient Microprocessor Design Energy Efficient Microprocessor Design by Thomas D. Burd Robert W. Brodersen with Contributions Irom Trevor Pering Anthony Stratakos Berkeley Wireless Research Center

More information

A Structured Programming Approach to Data

A Structured Programming Approach to Data A Structured Programming Approach to Data Macmillan Computer Science Series Consulting Editor: Professor F. H. Sumner, University of Manchester J. K. Buckle, The ICL 2900 Series Andrew J. T. Colin, Programming

More information

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis

More information

A Real-Time Locking Protocol

A Real-Time Locking Protocol Technical Report CMU/SEI-89-TR-018 ESD-89-TR-026 A Real-Time Locking Protocol Lui Sha Ragunathan Rajkumar Sang Son Chun-Hyon Chang April 1989 Technical Report CMU/SEI-89-TR-018 ESD-89-TR-026 April 1989

More information

Exam Review TexPoint fonts used in EMF.

Exam Review TexPoint fonts used in EMF. Exam Review Generics Definitions: hard & soft real-time Task/message classification based on criticality and invocation behavior Why special performance measures for RTES? What s deadline and where is

More information

SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY

SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY SPECC: SPECIFICATION LANGUAGE AND METHODOLOGY Daniel D. Gajski Jianwen Zhu Rainer Dömer Andreas Gerstlauer Shuqing Zhao University of California, Irvine SPRINGER

More information

Hardware Support for Priority Inheritance

Hardware Support for Priority Inheritance Hardware Support for Priority Inheritance Bilge. S. Akgul +, Vincent J. Mooney +, Henrik Thane* and Pramote Kuacharoen + + Center for Research on mbedded Systems and Technology (CRST) + School of lectrical

More information

Enhanced Web Log Based Recommendation by Personalized Retrieval

Enhanced Web Log Based Recommendation by Personalized Retrieval Enhanced Web Log Based Recommendation by Personalized Retrieval Xueping Peng FACULTY OF ENGINEERING AND INFORMATION TECHNOLOGY UNIVERSITY OF TECHNOLOGY, SYDNEY A thesis submitted for the degree of Doctor

More information

ECE 612: Embedded and Real-Time Systems

ECE 612: Embedded and Real-Time Systems ECE 612: Embedded and Real-Time Systems Instructor: A. Cyrus Sabzevari Last updated: 1/16/2013 Email: asabzeva@gmu.edu Spring 2013 Monday 7:20-10 PM Office Hours: Monday 6:10 7:10 in the adjunct faculty

More information

COMMUNICATION SYSTEMS The State of the Art

COMMUNICATION SYSTEMS The State of the Art COMMUNICATION SYSTEMS The State of the Art IFIP The International Federation for Information Processing lfip was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress

More information

Real-Time Operating Systems Design and Implementation. LS 12, TU Dortmund

Real-Time Operating Systems Design and Implementation. LS 12, TU Dortmund Real-Time Operating Systems Design and Implementation (slides are based on Prof. Dr. Jian-Jia Chen) Anas Toma, Jian-Jia Chen LS 12, TU Dortmund October 19, 2017 Anas Toma, Jian-Jia Chen (LS 12, TU Dortmund)

More information

Hierarchical Scheduling in Parallel and Cluster Systems

Hierarchical Scheduling in Parallel and Cluster Systems Hierarchical Scheduling in Parallel and Cluster Systems SERIES IN COMPUTER SCIENCE Series Editor: Rami G. Melhem University of Pittsburgh Pittsburgh, Pennsylvania ENGINEERING ELECTRONIC NEGOTIATIONS A

More information

THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE

THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ONTOLOGY LEARNING FOR THE SEMANTIC WEB ONTOLOGY LEARNING FOR THE SEMANTIC WEB by Alexander Maedche University of Karlsruhe, Germany SPRINGER

More information

FUZZY LOGIC WITH ENGINEERING APPLICATIONS

FUZZY LOGIC WITH ENGINEERING APPLICATIONS FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY

More information

DISSEMINATING SECURITY UPDATES AT INTERNET SCALE

DISSEMINATING SECURITY UPDATES AT INTERNET SCALE DISSEMINATING SECURITY UPDATES AT INTERNET SCALE Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email:

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Whitestein Series in software Agent Technologies. About whitestein Technologies

Whitestein Series in software Agent Technologies. About whitestein Technologies Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies

More information

Embedded and Real-Time Operating Systems

Embedded and Real-Time Operating Systems Embedded and Real-Time Operating Systems K.C. Wang Embedded and Real-Time Operating Systems 123 K.C. Wang School of Electrical Engineering and Computer Science Washington State University Pullman, WA USA

More information

Delivering MPEG-4 Based Audio-Visual Services

Delivering MPEG-4 Based Audio-Visual Services Delivering MPEG-4 Based Audio-Visual Services MULTIMEDIA SYSTEMS AND APPLICATIONS SERIES Recently Published Titles: Consulting Editor Borko Furht Florida Atlantic University DELIVERING MPEG-4 BASED AUDIO-VISUAL

More information

AUTOSAR Extensions for Predictable Task Synchronization in Multi- Core ECUs

AUTOSAR Extensions for Predictable Task Synchronization in Multi- Core ECUs 11AE-0089 AUTOSAR Extensions for Predictable Task Synchronization in Multi- Core ECUs Copyright 2011 SAE International Karthik Lakshmanan, Gaurav Bhatia, Ragunathan (Raj) Rajkumar Carnegie Mellon University

More information

Scheduling in Distributed Computing Systems Analysis, Design & Models

Scheduling in Distributed Computing Systems Analysis, Design & Models Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) by Deo Prakash

More information

REAL-TIME DATABASE SYSTEMS Architecture and Techniques

REAL-TIME DATABASE SYSTEMS Architecture and Techniques REAL-TIME DATABASE SYSTEMS Architecture and Techniques The Kluwer International Series in Engineering and Computer Science REAL-TIME SYSTEMS Consulting Editor: John A. Stankovic, University of Virginia

More information

HIGH-LEVEL SYNTHESIS FOR REAL-TIME DIGITAL SIGNAL PROCESSING

HIGH-LEVEL SYNTHESIS FOR REAL-TIME DIGITAL SIGNAL PROCESSING HIGH-LEVEL SYNTHESIS FOR REAL-TIME DIGITAL SIGNAL PROCESSING THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE VLSI, COMPUTER ARCHITECfURE AND DIGITAL SIGNAL PROCESSING Latest Titles

More information

Multi-Core Programming

Multi-Core Programming Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part

More information

On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling

On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling by John Michael Chase A thesis presented to the University of Waterloo in fulfillment of the thesis requirement

More information

Mobile Phone Security and Forensics

Mobile Phone Security and Forensics Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5

More information

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University

More information

Resource sharing and blocking. The Mars Pathfinder Unbounded priority inversion Priority inheritance

Resource sharing and blocking. The Mars Pathfinder Unbounded priority inversion Priority inheritance Resource sharing and blocking The Mars Pathfinder Unbounded priority inversion Priority inheritance 1 Lecture overview Unbounded priority inversion problem (occurred in the Mars Pathfinder) Blocking and

More information

A Framework for Real-Time Utilities for Ada 2005

A Framework for Real-Time Utilities for Ada 2005 A Framework for Real-Time Utilities for Ada 2005 A.J. Wellings and A. Burns Department of Computer Science University of York, UK {andy,burns}@cs.york.ac.uk Abstract Modernlarge real-time systems are becoming

More information

Groupware and the World Wide Web

Groupware and the World Wide Web Groupware and the World Wide Web Edited by Richard Bentley, Uwe Busbach, David Kerr & Klaas Sikkel German National Research Center for Information Technology, Institutefor Applied Information Technology

More information

The Verilog Hardware Description Language, Fifth Edition

The Verilog Hardware Description Language, Fifth Edition The Verilog Hardware Description Language, Fifth Edition The Verilog Hardware Description Language, Fifth Edition Donald E. Thomas ECE Department Carnegie Mellon University Pittsburgh, PA Philip R. Moorby

More information

COMPUTATIONAL DYNAMICS

COMPUTATIONAL DYNAMICS COMPUTATIONAL DYNAMICS THIRD EDITION AHMED A. SHABANA Richard and Loan Hill Professor of Engineering University of Illinois at Chicago A John Wiley and Sons, Ltd., Publication COMPUTATIONAL DYNAMICS COMPUTATIONAL

More information

COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements

COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY Thesis by Peter Anthony Leong In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute

More information

Fundamentals of Operating Systems

Fundamentals of Operating Systems Fundamentals of Operating Systems Macmillan Computer Science Series Consulting Editor Professor F. H. Sumner, University of Manchester S. T. Allworth, Introduction to Real-time Software Design Ian O. Angell,

More information

Enabling Component-Based Model Transformations with QVT. Li Dan

Enabling Component-Based Model Transformations with QVT. Li Dan Enabling Component-Based Model Transformations with QVT by Li Dan Doctor of Philosophy in Software Engineering 2013 Faculty of Science and Technology University of Macau Enabling Component-Based Model

More information

SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION

SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION SYNTHESIS OF FINITE STATE MACHINES: LOGIC OPTIMIZATION Tiziano Villa University of California/Berkeley Timothy Kam Intel Corporation Robert K. Brayton

More information

MODERN MULTITHREADING

MODERN MULTITHREADING MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING

More information

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC Wavelets Made Easy Yves Nievergelt Wavelets Made Easy Springer Science+Business Media, LLC Yves Nievergelt Department of Mathematics Eastem Washington University Cheney, WA 99004-2431 USA Library of Congress

More information

Beginning Functional JavaScript

Beginning Functional JavaScript Beginning Functional JavaScript Functional Programming with JavaScript Using EcmaScript 6 Anto Aravinth Beginning Functional JavaScript Anto Aravinth Chennai, Tamil Nadu, India ISBN-13 (pbk): 978-1-4842-2655-1

More information

An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1

An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 Albert M.K. Cheng and Fan Jiang Computer Science Department University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

Multiprocessor and Real-Time Scheduling. Chapter 10

Multiprocessor and Real-Time Scheduling. Chapter 10 Multiprocessor and Real-Time Scheduling Chapter 10 1 Roadmap Multiprocessor Scheduling Real-Time Scheduling Linux Scheduling Unix SVR4 Scheduling Windows Scheduling Classifications of Multiprocessor Systems

More information

ROBUST MODEL-BASED FAULT DIAGNOSIS FOR DYNAMIC SYSTEMS

ROBUST MODEL-BASED FAULT DIAGNOSIS FOR DYNAMIC SYSTEMS ROBUST MODEL-BASED FAULT DIAGNOSIS FOR DYNAMIC SYSTEMS The Kluwer International Series on ASIAN STUDIES IN COMPUTER AND INFORMATION SCIENCE Series Editor Kai-Yuan Cai Beijing University of Aeronautics

More information

Computer Science Workbench. Editor: Tosiyasu L. Kunii

Computer Science Workbench. Editor: Tosiyasu L. Kunii Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg

More information

Verifying Periodic Programs with Priority Inheritance Locks

Verifying Periodic Programs with Priority Inheritance Locks Verifying Periodic Programs with Priority Inheritance Locks Sagar Chaki, Arie Gurfinkel, Ofer Strichman FMCAD, October, 03 Software Engineering Institute, CMU Technion, Israel Institute of Technology Copyright

More information

Modeling and Analysis of Computer Communications Networks

Modeling and Analysis of Computer Communications Networks Modeling and Analysis of Computer Communications Networks Applications of Communications Theory Series Editor: R. W. Lucky, Bell Laboratories INTRODUCTION TO COMMUNICATION SCIENCE AND SYSTEMS John R. Pierce

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi

More information

Java Quick Syntax Reference. Second Edition. Mikael Olsson

Java Quick Syntax Reference. Second Edition. Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):

More information

Computer Literacy - A Beginners' Guide

Computer Literacy - A Beginners' Guide Computer Literacy - A Beginners' Guide Other Macmillan Books of Related Interest Advanced Graphics with the Acorn Electron Ian O. Angell and Brian J. Jones Advanced Graphics with the BBC Model B Microcomputer

More information

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4

More information

J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance

J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with

More information

The Verilog Hardware Description Language. Fifth Edition

The Verilog Hardware Description Language. Fifth Edition The Verilog Hardware Description Language Fifth Edition Donald Thomas Philip Moorby The Verilog Hardware Description Language Fifth Edition Donald Thomas Carnegie Mellon University Pittsburgh, PA USA Philip

More information

FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS

FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS FINITE FIELDS FOR COMPUTER SCIENTISTS AND ENGINEERS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE INFORMATION THEORY Consulting Editor Robert G. Gallager FINITE FIELDS FOR COMPUTER

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Multiprocessor and Real- Time Scheduling. Chapter 10

Multiprocessor and Real- Time Scheduling. Chapter 10 Multiprocessor and Real- Time Scheduling Chapter 10 Classifications of Multiprocessor Loosely coupled multiprocessor each processor has its own memory and I/O channels Functionally specialized processors

More information

Multimedia Systems 2011/2012

Multimedia Systems 2011/2012 Multimedia Systems 2011/2012 System Architecture Prof. Dr. Paul Müller University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Sitemap 2 Hardware

More information

PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS

PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS PARALLEL, OBJECT -ORIENTED, AND ACTIVE KNOWLEDGE BASE SYSTEMS The Kluwer International Series on ADVANCES IN DATABASE SYSTEMS Series Editor Ahmed K. Elmagarmid Purdue University West Lafayette, IN 47907

More information

DATA VISUALIZATION WITH FLASH BUILDER

DATA VISUALIZATION WITH FLASH BUILDER DATA VISUALIZATION WITH FLASH BUILDER DESIGNING RIA AND AIR APPLICATIONS WITH REMOTE DATA SOURCES CESARE ROCCHI First published 2011 by Focal Press Published 2017 by Routledge 2 Park Square, Milton Park,

More information

T an important area of research in real-time computer systerns.

T an important area of research in real-time computer systerns. IEEE TRANSACTIONS ON COMPUTERS, VOL. 39, NO. 9, SEPTEMBER 1990 1175 Priority Inheritance Protocols: An Approach to Real-Time Synchronization Abstmct- A direct application of commonly used synchronization

More information

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems

TIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems TIME-CONSTRAINED TRANSACTION MANAGEMENT Real-Time Constraints in Database Transaction Systems The Kluwer International Series on ADV ANCES IN DATABASE SYSTEMS Other books in the Series: Series Editor Ahmed

More information

Analyzing Real-Time Systems

Analyzing Real-Time Systems Analyzing Real-Time Systems Reference: Burns and Wellings, Real-Time Systems and Programming Languages 17-654/17-754: Analysis of Software Artifacts Jonathan Aldrich Real-Time Systems Definition Any system

More information

PARALLEL ARCHITECTURES AND PARALLEL ALGORITHMS FOR INTEGRATED VISION SYSTEMS

PARALLEL ARCHITECTURES AND PARALLEL ALGORITHMS FOR INTEGRATED VISION SYSTEMS PARALLEL ARCHITECTURES AND PARALLEL ALGORITHMS FOR INTEGRATED VISION SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ROBOTICS: VISION, MANIPULATION AND SENSORS Consulting Editor:

More information

HIGH-SPEED COMMUNICATION NETWORKS

HIGH-SPEED COMMUNICATION NETWORKS HIGH-SPEED COMMUNICATION NETWORKS HIGH-SPEED COMMUNICATION NETWORKS Edited by Harry Perros North Carolina State University Raleigh, North Carolina Springer Science+Busines s Media, LL C Library of Congress

More information

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Real-time systems deliver services while meeting some timing constraints Not necessarily fast,

More information

Functional Programming in R

Functional Programming in R Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis

More information

Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved

Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved Study & Enhancement of Fly spray Bug Tracking Tool Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur Abstract: As software projects become increasingly

More information

Microkernel/OS and Real-Time Scheduling

Microkernel/OS and Real-Time Scheduling Chapter 12 Microkernel/OS and Real-Time Scheduling Hongwei Zhang http://www.cs.wayne.edu/~hzhang/ Ack.: this lecture is prepared in part based on slides of Lee, Sangiovanni-Vincentelli, Seshia. Outline

More information