IRIS: A new reclaiming algorithm for server-based real-time systems

Size: px
Start display at page:

Download "IRIS: A new reclaiming algorithm for server-based real-time systems"

Transcription

1 IRIS: A new reclaiming algorithm for server-based real-time systems Luca Marzario and Giuseppe Lipari Scuola Sup. S.Anna, Pisa, Italy marzario, lipari@sssup.it Patricia Balbastre and Alfons Crespo Universidad Politecnica de Valencia, Valencia, Spain patricia, alfons@disca.upv.es Abstract In this paper we present a new algorithm for CPU resource reservation in real-time systems that allows the coexistence of hard, soft and non real-time tasks. The proposed algorithm is specifically designed to handle computational overload. A task that needs more CPU-time than reserved can re-use the spare bandwidth, without interfering with the others tasks. With respect to other reclamation schemes, the novelty of the proposed algorithm is that the spare bandwidth is fairly distributed among the needing servers. The effectiveness of the algorithm is demonstrated with an extensive set of experiments. We also propose a methodology to set scheduling parameters depending on the type of the task and on the time constraints needed. 1. Introduction General purpose operating systems are not well suited for executing soft real-time applications, like multimedia applications or monitoring systems, because of their particular requirements in terms of delay and jitter limitation. On the other hand, hard real-time operating systems generally offer support only for hard real-time processes, providing a best effort service to non real-time processes. Abeni and Buttazzo [2] list the main e reasons why scheduling such applications in hard real-time systems is unpractical. In recent years, many researchers studied the problem of integrating hard, soft and non-real-time tasks. One of the best approaches is the resource reservation framework [10]. For soft real-time tasks, the notion of reservation guarantee has been introduced. This reservation ensures that an amount É of a resource will be available to the reserved task every period È Reservation guarantees for soft real-time tasks can also be applied to other kind of applications besides multime- This work has been partially supported by the OCERA project (IST ), funded by the European Commission dia systems. Mobile robotic systems are performed combining deliberative goal-oriented planning with reactive sensor driven operations. This results in an heterogeneous system with reactive activities and deliberative processes. Usually, the first ones have hard real-time constrains, while the second ones are implemented as soft real-time tasks. Hassan, Simo and Crespo [5] presented a real-time architecture to cope with the dynamic and flexible environment of behavior-based mobile robotic applications. The combination of hard and soft activities is also found in industrial control applications, where the control action of the regulator can be obtained in a first step by a hard real-time task, and if there is enough time, the control action is refined using the remaining time of the system (by a soft real-time task) [3]. Balbastre et al. proposed a framework in which tasks are divided into a mandatory part and in a optional computation, and the amount of this extra computation is guaranteed off-line. The main advantage is the ease of implementation of the system, since in this case the task model is simpler than imprecise computation models or multiple version tasks. Algorithms such as CBS [1] or GRUB [6, 4] fit perfectly to implement this kind of applications. However, as explained in the following sections, both CBS and GRUB suffer from certain shortcomings. This paper presents a new work-conserving algorithm called IRIS (Idle-time Reclaiming Improved Server), that presents significant improvements respect to CBS and GRUB. The main property of IRIS is that it guarantees a minimum budget in a fixed interval of time. This is a key issue for the applications explained before, and leads to a significant improvement in its behavior. 2. System model and notation In this research, we consider two types of tasks in the system: cyclic tasks and non cyclic tasks. A cyclic task consists of a main loop. At the end of every loop instance the task blocks waiting for some event. Each execution between two blockings is called job  We indicate with the worst-case execution time (WCET) of Cyclic tasks can be divided into periodic tasks that wait for a periodic

2 timer event with period Ì ; sporadic tasks that wait for external events with a minimum inter-arrival time, also called Ì ; aperiodic tasks that wait for external events with an unbounded inter-arrival time. We assume that the relative deadline of cyclic tasks is equal to Ì Each job  has associated an arrival time and a deadline We denote with Í Ì the utilization factor of task Moreover, cyclic tasks can be divided into two classes, depending on their criticality: hard real-time and soft real-time. For the hard real-time tasks, it must be guaranteed that every job completes before its deadline while for soft real-time task a deadline miss could result in a performance degradation but not in a critical fault. Acyclic tasks modelbatch activities that are continuously active for large intervals of time, like for example the process of compiling a program, or a long scientific simulation or calculation, or a control tasks polling an external sensor. Usually, they are not associated any temporal constraint. However, in some case it may be desirable to execute them at a certain minimum rate. A server is an abstract entity used by the scheduler to reserve a fraction of CPU-time to a task. Each server Ë is characterized by the period of the reservation È and by the reserved execution time per period É ;wedefineí É È the fraction of CPU-time reserved by server Ë, also called utilization factor. In addition, each server maintains its own internal variables that are updated by the scheduler depending on the server rules. One of these variables is the server priority. The servers are inserted in the priority queue of the scheduler. When a server is selected by the scheduler, the corresponding task is executed. While a task is executing, the budget of the server is decremented accordingly. We denote by Õ the current budget of server Ë When the budget is exhausted, the task is stopped until the budget is replenished. We denote with Ö the time at which the budget is replenished. Each server has a dynamic deadline that is used by the scheduler to order tasks in the priority queue, accordingly with EDF algorithm [7]. 3. Problem description Algorithm IRIS that we present in this paper is based on the Constant Bandwidth Server (CBS) of Abeni and Buttazzo [1]. The basic idea of the CBS algorithm is that, when the budget is exhausted, it is immediately recharged to Õ É and its dynamic deadline is postponed to È The CBS presents some drawbacks when serving acyclic tasks. In Figure 1a we show an example of such problems. Consider a system consisting of two acyclic tasks ½ and ¾ served by servers Ë ½ e Ë ¾, respectively. Suppose that at a certain instant ½ is the only active task in the system and executes without stopping itself. The associated server Ë ½ consumes all its budget, postponing its deadline several times so that it goes far away in the future. When task ¾ ar- τ 1 τ 2 τ 1 τ 2 Figure 1. (a) Problem of CBS when scheduling acyclic tasks. (b) Another problem of CBS: the server parameters are not respected. rives, server Ë ¾ is assigned a short deadline and, according to the EDF scheduler, it executes. When budget of Ë ¾ is entirely consumed, its deadline is postponed. However, since the deadline of server Ë ½ is far away, it is still the earliest deadline and continues to execute. Only after its own deadline becomes greater than the deadline of Ë ½ Ë ¾ is preempted and the first task can continue to execute. As you can see in Figure 1a, the servers do not execute É every È Moreover, the amount of execution in every period for server Ë ½ depends on the arrival time and on the period of server Ë ¾ We say that both servers suffer from deadline aging. Another problem can be highlighted by the following example. Consider a system scheduled by the CBS algorithm consisting of two tasks. Task ½ is acyclic it is served by server Ë ½ with budget É ½ ½and period È ½ The second task ¾ is periodic with period Ì ¾ ½and it is served by a server Ë ¾ with budget É ¾ ½¾and È ¾ ½ The resulting schedule is shown in Figure 1b. Task ½ is not scheduled as we expect. In particular, it executes as it was served by a server with budget É ¼ ½ and period Ƚ ¼ ½ Notice also that this behavior depends on the parameters of the other servers in the system. For example, if the second server had a budget of É ¾ ¾and a period of È ¾ ¾ the first task would be scheduled as it was served by a server with budget É ¼ ½ and period È ½ ¼ ¾ This problem is more subtle and depends on the fact that CBS algorithm immediately recharges the budget without suspending the tasks. This second problem can be solved by using the technique called hard reservation [10]. In a hard reservation, when the budget is exhausted, the corresponding task is suspended until a recharging time. Nevertheless, adding only this rule to the CBS algorithm makes it a non-work-conserving algorithm: the system is forced to be in idle state even if there are pending jobs. Summarizing, the main drawback of CBS algorithm is that it does not guarantee a minimum execution time to a task in a fixed interval of time. This is particularly negative for multimedia or interactive tasks, since the period of

3 forced inactivity, caused by a possible starvation after an overload situation, can result in a loss of quality of service and interactivity. To solve these problems, we decided to propose a novel algorithm called IRIS (Idle-time Reclaiming Improved Server) that overcomes the aging deadline problem, guarantees a minimum budget in a fixed interval of time, and it is work-conserving. 4. The IRIS Algorithm 4.1. Definition IRIS is based on the CBS [1]. It can be defined as follows: Each server Ë is associated to a task and is characterized by an ordered pair É È µ where É is the maximum budget and È is the relative deadline. The sum of all server bandwidths É È cannot exceed 1: È Ò ½ É È ½ Each server Ë maintains: a current budget Õ that is decreased while the served task is running; a server deadline that is used to insert the server in the EDF queue of the system scheduler; a recharging time Ö that is used to set the time to recharge the current budget when it has been exhausted. Each server can be in one of the following states: 1. Active: the served task is ready to execute or executing and the current budget Õ ¼ 2. Recharging: the served task is ready to execute but the server is waiting for replenishment of the exhausted budget; 3. Inactive: the served task completed the last job and has no more pending jobs. Inactive Active Recharging Figure 2. State transition diagram. The system maintains a ready queue, where all Active servers are ordered by deadline, and a recharging queue, where all Recharging servers are ordered by recharging time. Initially all servers are in the Inactive state. The current budget and the relative deadline associated with each server Ë are updated applying the following rules: 1. If a job  arrives at time t, (a) if the server is Inactive, È i. if Ø Õ É then Õ É Ø È ii. if Ø and Õ ¼ the server becomes Recharging and it is inserted in the recharging queue with Ö iii. otherwise the server becomes Active and it is inserted again in the ready queue with the same current budget and deadline. (b) if the server is Active or Recharging, the arrival is buffered and will be served later. 2. When the served task executes for Æ Õ Õ Æ 3. If the server is Active and Õ ¼ the server reaches the Recharging state and the recharging time is set to Ö 4. If the server is in the Recharging state and Ø Ö then the server become Active, Õ É and È 5. When the job finishes, (a) if there is another pending job, the server remains in the Active state; (b) otherwise it goes in Inactive state. 6. If at time Ø no server is in Active state and there is at least one server in Recharging state, (a) let Ë be the first server in the recharging queue (i.e. the one with the smallest recharging time), and let Æ Ö Ø for every server i in the recharging queue, Ö Ö Æ (b) every server Ë in the recharging queue with Ö Ø is removed from the recharging queue and inserted in the ready queue; its budget is recharged to Õ É and its deadline is set to Ø È The IRIS algorithm presents two main differences with respect to the original CBS algorithm. The first difference is that IRIS explicitly sets a recharging time Ö for each server, whereas the CBS algorithm immediately recharges the server that exhaust its budget. Therefore, the IRIS algorithm implements the hard reservation technique [10]. Second, and most important, the IRIS algorithm introduces a rule for advancing the recharging times of all the servers in the Recharging state when an idletime occurs. In this way, the IRIS algorithm efficiently reclaims the idle time of the system and distributes it among the needing servers.

4 4.2. Properties The IRIS algorithm maintains the original CBS schedulability property. It is also a fair algorithm in the sense that the spare time is equally distributed among the servers that need to execute more than the reserved CPU time. Before proving the theorems, we introduce a simplified scheduling algorithm that use the same rules of IRIS except Rule 6. This algorithm has the same behavior as IRIS exceptthatwhenallserversarein Recharging state, the CPU is forced to be idle until the next re-charging event. We will call it IRIS-HR (IRIS Hard Reservation). We are not going to implement IRIS-HR, but we use it only for the sake of demonstrating the properties of IRIS. Definition 1 We define the demand bound function of an IRIS-HR server Ë as Ë Øµ Ø É È We indicate with Ë Ø½µ Ë µ Ë Ø½µ Lemma 1 (Utilization factor) The demand bound function of an IRIS-HR server Ë with parameters É È µ in any intervals ؽ never exceed É È Proof The proof of this lemma is similar to the same property of the CBS algorithm (see [1]). We remand the reader for the full proof to [8]. Theorem 1 (Schedulability Property) Given È a set of periodic tasks with total utilization factor Í Ô È Í and a set of IRIS servers with utilization factor Í Í the whole set is schedulable by EDF if and only if Í Ô Í ½ For space limitation, we do not report the proof of this theorem here. The proof can be found in [8]. Theorem 2 (Hard Schedulability) A hard task with period Ì and WCET is schedulable by an IRIS server with parameters É and È Ì if and only if is schedulable with EDF. Proof For any job of a hard task we have that Ö ½ Ö È and É Hence, by definition of the IRIS, each server is assigned a deadline Ö È equal to the job deadline, and it is scheduled with a budget É Moreover, since É each job finishes before the budget is exhausted, the server deadline assigned to a job is never postponed and is exactly the same as the one used by EDF; moreover, the server will never reach the Recharging state so the rule 6 will never be applied. By Theorem 1 the job will never miss its deadline. Note that Theorem 2 is valid both for IRIS and IRIS-HR since the Recharging state will never be reached and therefore Rule 6 is never applied. Property 1 (Minimal execution time guarantee) Let ؽ be an interval such that server Ë serving task is never inactive. If ؽ ¾È É then executes at least É unit of time in the interval ؽ Proof Let Ö be the first replenishing time for server Ë in ؽ We now analyze all possible case that current budget Õ can assume at time ؽ: Õ É This means that the budget has been replenished at time ؽ È É µ Ö ½ ؽ Contextually, the deadline is set to Ö ½ È In the worst case, Ö ½ ؽ so that the server deadline at time ؽ is ؽ È Ø½ ¾È É Since the server will execute at least É up to by setting the theorem holds. Õ ¼ This means that the server executed for at list É since the last recharging time Ö ½ so ؽ Ö ½ É In the worst case the budget is just exhausted (ؽ Ö ½ É ) and there will be no idle time till ½ Ö ½ È hence Ö ½ ؽ È É At instant Ö the budget is replenished and the deadline is set to Ö È Ø½ ¾È É ;theserver will execute at least É from Ö up to By setting the theorem holds. ¼ Õ É This means that ؽ Ö ½ É Õ µ and ½ ؽ È É Õ µ In this case executes for at least Õ unit of time up to ½ In the worst case, at Ö ½ Ö ½ È the budget is replenished. will be scheduled at least at the time Ø Ö È É É This descends from Theorem 1, since otherwise the server will miss its deadline. Consider the instant ؽ ¾È É Ö ½ É Õ µ ¾È É Õ Since in the worst case is scheduled at Ø and executes till it executes in the interval Ø for Ø É Õ Hence in the interval ؽ execute at least Õ É Õ µé An interesting property of IRIS server is that it solves the deadline aging problem (see Section 3). Property 2 If is the deadline associated to the server Ë at time Ø we have that: Ø Ø È Proof This is easily proved since each time the server deadline is assigned, it is set to the current time plus the period of the server. The IRIS algorithm distributes the spare

5 time among the reclaiming servers in a fair way: the spare time of the system is redistributed to the servers proportionally to the reserved bandwidths. Since the allocation of CPU time is not fluid, we show the property only in intervals large enough with respect to the periods of the servers. For simplicity we analyze the case in which the served tasks are always ready to execute. We denote by Í ¼ Ø ¾ µ the bandwidth used by server Ë in the interval Ø ¾ : Í ¼ Ø É¼ ɼ µ ؽµ ¼ ½Ø ¾ µ Ø ¾ Ø ½ where É Øµ is the amount of budget used by server Ë until time Ø Theorem 3 (Fairness) Consider two IRIS servers Ë Ë serving tasks that are always ready to execute (the servers are always in the state Active or Re-charging). The following property holds: Ø ¾ Ø ¾ ¾È ÑÜ Í Í Ø ¾ ¾È µ Ø ¾ ¾È µ Í ¼ Ø ¾ µ Í ¼ Ø ¾ µ Í Í Ø ¾ ¾È µ Ø ¾ ¾È µ (1) where È ÑÜ ÑÜ È È µ Proof We first consider the IRIS-HR algorithm and then we show that the same property is valid for IRIS. Under the hypothesis, the only rule applied to set the budget and deadline, after the first assignment when the first request is raised, is Rule 4. This implies that at each reservation s period, each server execute exactly for É unit of time. The minimum total budget É ¼ ÑÒ assignedtoserver in any interval Ø ¾ is: É ¼ ÑÒ Ø ¾ µ This minimum corresponds to the case in which the budget has just been replenished at time É and exhausted at time ; moreover, at Ø ¾ the server is going to execute and the budget will exhaust at the deadline expiration time Ø ¾ É Similarly, the maximum total budget is: É ¼ ÑÜ Ø ¾ µ ½ É È This is the case when at the server is scheduled and will exhaust its budget at the deadline expiration É and at Ø ¾ É the budget has just been replenished and is exhausted at time Ø ¾ (the dual situation of the previous one). We now calculate the minimum ratio between the budget assigned respectively to two servers and in Ø ¾ : É ¼ ÑÒ Ø ¾ µ É ¼ Ø ¾ µ È É¼ ÑÒ Ø ¾ µ É ¼ ÑÜ Ø ¾ µ ½ Ð É È Ø ¾ È ½ Ñ ½ É É The ratio can be minimized as following: Ð È Ø ¾ È É È ¾ É Ø É ¾ È ¾ É ½ Ñ ½ Ø ¾ ¾È µ É È Ø ¾ ¾È µ É È where we defined Æ ÑÒ Ø ¾ ¾È µ Similarly to minimum ratio, maximum ratio is: É ¼ ÑÜ Ø ¾ µ É ¼ Ø ¾ µ ؽ ¾Èµ ɼ ÑÜ Ø ¾ µ É ¼ ÑÒ Ø ¾ µ The ratio can be maximized as following: Ð È È Ñ ½ É ½ É where Æ ÑÜ Finally, we have Í Í Æ ÑÒ Ð È ¾ É È ¾ É Ø ¾ ¾È µ É È Ø ¾ ¾È µ É È Ø½ ¾Èµ Ø ¾ ¾È µ É ¼ ÑÒ Ø ¾µ Ø ¾ É ¼ ÑÜ Ø½µ Ø ¾ Í ¼ Ø ¾ µ Í Ø ¼ ½Ø ¾ µ È È Í Í Æ ÑÒ Ñ ½ É ½ É Í Í Æ ÑÜ É ¼ ÑÜ Ø½µ Ø ¾ É ¼ Ø ÑÒ ½Ø ¾µ Í Æ ÑÜ Í Ø ¾ Now consider the schedule Á generated by IRIS. Applying Rule 6 the schedule is modified when the system is idle by anticipating of the same amount the activation time of all tasks that are in Recharging state. This anticipation does not modify the order and the distance between two consecutive recharging events. This means that, considering the two servers Ë and Ë we can map one-to-one every recharging instant and period of reservation of the IRIS-HR schedule Ö with the IRIS schedule Á Consider an interval Ø ¾ in Ö and the corresponding one Ø ¼ ½ ؼ ¾ in Á Since the total budget assigned in the two intervals is the same, the expression calculated above is still true if we substitute and Ø ¾ with Ø ¼ ½ and Ø ¼ ¾ Note that Equation 1 depends exclusively on the size of the interval and not on the position of the time window. The schedulability property (Theorem 1) is an important result because allow us to execute in the same system EDF, IRIS-HR and IRIS servers, assigning independently the processor utilization to each server with the only (obvious) con-

6 straint that the total utilization must be less than 1. This allows an easy design of system s bandwidth reservation (see section 5). IRIS automatically reclaims the spare time of the system. This is done applying the rule 6. The reclamation is done at a certain time Ø if and only if all active servers executed at least for the reserved time in the current period. Hence, IRIS prevents the reclamation of a server from delaying the execution of other servers or hard real-time tasks that have not yet executed in the current reservation period. Moreover, IRIS avoids the irregularities of the CBS schedules, which are caused by an early reclamation, as we have seen in Section 3. This is the main difference with respect to CBS algorithm. The regularity of the IRIS algorithm with respect to CBS has been also proved by properties 1 and System s Design All the properties mentioned in the previous section allow us to use a bandwidth reservation strategy to allocate a fraction of the CPU time to each task independently of the other tasks in the system. In particular, we can execute in the same system different types of task, cyclic and acyclic, hard and soft. In this section, we give some suggestion on how to assign the budget and the period to the different tasks in the the system. Hard real-time tasks. Hard real-time tasks can be scheduled directly by EDF or by a dedicated IRIS server. The second solution ensures that tasks executing for longer than estimated do not jeopardize the entire system. This is useful especially in the developing and debugging phase. Soft real-time tasks. In the case of periodic soft realtime tasks, we can set È to the task s period. For aperiodic tasks, the server period should be set equal to the maximum response time needed. To set É we have more freedom: since setting it to the WCET may waste the CPU utilization, we can set this parameter to some value between the task s average execution time and its WCET. The trade off is between the amount of reserved bandwidth and the number of deadline miss. Non real-time tasks. These tasks do not have time constraints. However, in many cases it could be desirable to execute them at a certain rate. In this case a server could be used to reserve a fraction of CPU time to each task. È must be set to the granularity of reservation, while É must be set proportionally to the needed bandwidth. Since we proved that that IRIS-HR servers can be scheduled together to IRIS servers, we can use a IRIS-HR server to force a task to use no more than the reserved bandwidth. This could be important in case we want to use an external control system to dynamically assign the bandwidth to a task, like in the case of feedback scheduling [9], to manage power consumption or simply to slow down a particular application. 6. Simulation results In this section, we show the effectiveness of the IRIS algorithm. The goal is to highlight two important characteristics of IRIS against CBS: good performance in overload situations, and minimal temporal utilization guarantee. A massive number of tests have been run using a synthetic workload model. In the following, we describe the simulations settings and the obtained results Performance in overloaded systems The task sets for these experiments were generated with the following characteristics: Three hard real-time periodic tasks, generated with random and Ì The bandwidth consumed by hard tasks is: Í Ö È ½ Two soft real-time tasks that serve sporadic jobs, whose inter-arrival and execution times are also randomly generated around the values É and È Atotal of 300 jobs are generated for each task. The soft load is: É Í Ó Ø È The variable measured is the average response time of sporadic tasks, when task sets are scheduled under IRIS and CBS. Being ÖØ the response time of the job  the average response time of soft real-time is defined as follows: ¼¼ ÖØ Ú ÖØ Ö ½ Ö ¼ In the first experiment, soft real-time tasks consume 15% of the total utilization of the system (Í Ó Ø ¼½) while hard task parameters are specified with Í Ö ranging from 0.2 to 0.6. We assume that the computation time of the jobs ( ) is similar to the budget of the server assigned to the task (É ). In this case, average response time is very similar in IRIS and CBS, although it is slightly lower in the case of IRIS. Experiment 2 has been generated with the same characteristics than Experiment 1, except that an overload situation is forced. We can create an overloaded system if some jobs have a much greater than its budget

7 (we call it heavy jobs). In the simulations, every 10 activations É The results are shown in Figure 3. In this case, IRIS performs much better than CBS, because CBS suffers from deadline aging, and when a heavy job arrives, the budget is replenished several times and the deadline is moved away. This way, the response time of the heavy job, and also the response time of future jobs, is highly increased. However, as IRIS does not replenish the budget immediately, the jobs that arrive after the heavy one do not suffer the consequences of the overload, maintaining a reasonable response time. In Experiments 3 and 4, shows the percentage of missed deadlines with both algorithms for the task sets generated in Experiment 4. The results show that the maximum deadline misses of IRIS is less than 30%, being always greater in CBS. Figure 5. Deadline misses under overload situation 6.2. Fairness of bandwidth allocation Figure 3. Response time under overload situation (Í Ó ±) hard tasks consumes 35% of the total utilization of the system (Í Ö ¼ ) while soft real-time tasks parameters É and È are generated with Í Ó Ø ranging from 0.1 to 0.5. Experiment 3 simulates a normal execution while Experiment 4 simulate an overload situation. Figure 4. Response time under overload situation (Í Ö ±) In both experiments, the performance of IRIS is better than CBS, with a great improvement in the overloaded systems (Figure 4). The number of missed tasks deadlines is also an important parameter that must be taken into account. Figure 5 In this section, we compare the bandwidth is assigned dinamycally in IRIS and CBS in order to prove that IRIS is more fair. In the first experiment, the workload consists of 6 greedy tasks ( ½ ), with É and È randomly generated, except budget for that is É ½ Task set parameters are generated to have different utilization (from 20 to 80%). In this case, the variable measured is the distance between two consecutive executions of task As this task has É ½ we want to see if the required utilization of the task is guaranteed for both algorithms. During the simulations, the number of occurrences of every value of the distance have been counted. The distance between two consecutive executions has been normalized to the period È Figure As it 6 can shows bethe seen, results. CBS executes with a great variability, and most of the times task executions are very close. But, due to deadline aging, when the budget is exhausted, the task scheduled under CBS can stay without executing for a long time. This is the reason why under CBS, the time between two consecutive executions can be up to 440% of the task period. However, a task scheduled under IRIS executes most of the times every period, or less. And the maximum interval between two executions is only 190% (¾È É ). This property of IRIS is specially important in systems where reducing jitter is a key issue, such in control systems. The second experiment consists of measuring the utilization of greedy tasks all over the execution of the system, and see what happens to utilization when a new greedy task arrives. The goal is to demonstrate that IRIS is more fair in distributing the idle time than CBS.

8 7. Conclusions and future work Figure 6. Comparison of distance between two consecutive executions Experiments have been done as follows: three acyclic tasks ½ ¾ and have been generated with server periods ranging from 10 to 30. First activation of ½ and ¾ is set to the initial instant (t=0), while first activation of is set to instant t=30. The variable measured is ͽ ؽµ ¼ Í ½ Similar results have been obtained with Í ¾ ¼ ؽµ Í ¾ but in Figure 7 are depicted results only for ½ Instants and Ø ¾ have been chosen to measure utilization in windows that moves over the total execution of the system. The size of the windows is the largest period the three tasks. This means that, in Figure 7, point 1 in X coordinates means the first window ( ¼Ø ¾ ÑÜÔÖÓ), point 2 is the second window ( ½ Ø ¾ ÑÜÔÖÓ ½), and so on. Figure Figure 7. Fairness: acyclic tasks 7 shows that, in CBS, the utilization of ½ rapidly goes to 0when arrives (t=30). And the same happens to ¾ As a consequence, CBS does not maintain the utilization required. However, IRIS maintains the required utilization of ½ even when new tasks arrives, or even in overload situations. In this paper, the IRIS algorithm has been presented. It is a new resource reservation scheduling algorithm expressly designed to deal with systems consisting of different types of tasks, cyclic and acyclic, periodic and aperiodic, hard and soft real-time tasks. IRIS enhances the CBS algorithm [1] by introducing an efficient reclamation mechanism. In addition, IRIS provides a fair distribution of the spare time to the needing tasks, and ensure a minimum execution time to each task in every interval of time. Simulations corroborated the theoretical results, showing the better performance of IRIS against CBS. Current research is focused on the implementation of IRIS in a realtime kernel. A first version has been released in RTLinux under the OCERA IST project. The goal is to use the benefits of this new algorithm with real applications. References [1] L. Abeni and G.Buttazzo. Integrating multimedia applications in hard real-time systems. In Proceedings of the 19th IEEE Real-Time Systems Symposium, Madrid, Spain, december IEEE. [2] Luca Abeni. Server mechanisms for multimedia applications. Technical Report RETIS TR98-01, Scuola Superiore S. Anna, [3] Patricia Balbastre, Ismael Ripoll, and Alfons Crespo. Schedulability analysis of window-constrained execution time tasks for real-time control. In 14th Euromicro Conference on Real-Time Systems., [4] G.Lipari and S.K. Baruah. Greedy reclaimation of unused bandwidth in constant bandwidth servers. In IEEE Proceedings of the 12th Euromicro Conference on Real-Time Systems, Stokholm, Sweden, June [5] H. Hassan, J. Simo, and A. Crespo. Flexible real-time mobile robotic architecture besed on behavioural models. Engineering applications of Artificial Inteligence, 14(2): , [6] G. Lipari. Resource Reservation in Real-Time Systems. PhD thesis, Scuola Superiore S.Anna, [7] C.L. Liu and J.W. Layland. Scheduling algorithms for multiprogramming in a hard-real-time environment. Journal of the Association for Computing Machinery, 20(1), [8] Luca Marzario and Giuseppe Lipari. Properties of the iris scheduling algorithm. Technical Report ReTiS-TR04-02, Scuola Superiore S. Anna, [9] Luigi Palopoli, Tommaso Cucinotta, and Antonio Bicchi. Quality of service control in soft real-time applications. In Proc. of the IEEE 2003 conference on decision and control (CDC02), Maui, Hawai, USA, December [10] Raj Rajkumar, Kanaka Juvva, Anastasio Molano, and Shuichi Oikawa. Resource kernels: A resource-centric approach to real-time and multimedia systems. In Proceedings of the 4th Real-Time Computing Systems and Application Workshop. IEEE, November 1997.

Improved Handling of Soft Aperiodic Tasks in Offline Scheduled Real-Time Systems using Total Bandwidth Server

Improved Handling of Soft Aperiodic Tasks in Offline Scheduled Real-Time Systems using Total Bandwidth Server Improved Handling of Soft Aperiodic Tasks in Offline Scheduled Real-Time Systems using Total Bandwidth Server Gerhard Fohler, Tomas Lennvall Mälardalen University Västeras, Sweden gfr, tlv @mdh.se Giorgio

More information

ÕÙ ØÝ ÌÖ Ò Ý ÁÒ Ø ØÙØ ÓÒ Ð ÁÒÚ ØÓÖ ÌÓ ÖÓ ÓÖ ÆÓØ ØÓ ÖÓ Ì Ó Ø ÆÓÖÛ Ò È ØÖÓÐ ÙÑ ÙÒ º Ê Ò Æ ÆÓÖ Ò ÖÒØ ÖÒ Ö ÆÓÖ Ò Ò ÆÓÖÛ Ò Ë ÓÓÐ Ó Å Ò Ñ ÒØ ½ Â ÒÙ ÖÝ ¾¼¼¼ ØÖ Ø Ì Ó Ø ØÓ Ò Ø ØÙØ ÓÒ Ð ÒÚ ØÓÖ Ó ØÖ Ò ÕÙ ØÝ Ö Ó

More information

Aperiodic Task Scheduling

Aperiodic Task Scheduling Aperiodic Task Scheduling Gerhard Fohler Mälardalen University, Sweden gerhard.fohler@mdh.se Real-Time Systems Gerhard Fohler 2005 Non Periodic Tasks So far periodic events and tasks what about others?

More information

ËØØ ØÐ ÒÐÝ Ó ÒÓÑÔÐØ Ø ØÓÖÝ ØÒÕÙ Ò ÓØÛÖ º ź ÆÓÖÓÚ ÈÖ Ò ÙÔÔÐÑÒØ ØÓ Ø ÊÙ Ò ØÓÒ Ó ÄØØРʺºº ÊÙÒ ºº ËØØ ØÐ ÒÐÝ ÏØ Å Ò Øº ÅÓ ÓÛ ÒÒ Ý ËØØ Ø ÔÔº ¹ ¾¹ ¾ ½½µ Ò ÊÙ Òµ ÈÖ ËØØ ØÐ ÒÐÝ ÛØ Ñ Ò Ø ÔÖÓÐÑ ÒÓÛÒ ØÓ ÐÑÓ Ø

More information

ÆÏ ÈÈÊÇÀ ÌÇ Ëµ ÁÆÎÆÌÇÊ ËËÌÅË ÂÒ¹ÉÒ ÀÙ ÅÒÙØÙÖÒ ÒÒÖÒ Ó ØÓÒ ÍÒÚÖ ØÝ ËÓÖ ÆÒÒÙÙÐ Ý Ò Ï¹Ó ÓÒ Ý ÐØÖÐ Ò ÓÑÔÙØÖ ÒÒÖÒ ÍÒÚÖ ØÝ Ó Å Ù ØØ ÑÖ Ø ÖÙÖÝ ØÖØ ÁÒ Ø ÔÔÖ Û ÓÒ Ö ÔÖÓ ÖÚÛ Ëµ ÒÚÒØÓÖÝ Ý ØÑ ÛØ ÒÔÒÒØ Ò ÒØÐÐÝ ØÖÙØ

More information

ÐÓÒ¹Ü Ö ËÔÖ ½ ÖÖÐÐ ÙÆ Ò ÂÙÒ ÄÙ ËÒÓÖ ÍÒÚÖ Ý ÙÖÖÒ ÎÖ ÓÒ ÑÖ ¾ ½ Ö Ï ÙÝ ÖÑ ÖÙÙÖ Ó ÝÐ ÔÖ ÛÒ ÓÒ¹Ö Ò Ü¹ Ö ÒÓ Ó Ñ Ö ÕÙÐÝ Ò ÑÙÖݺ ÐÓÒ¹ Ü ÔÖ Ö ÓÖÐÐÝ ÖÖÞ Ò ÓÑ ÔÖÐ Ò ÕÙÒ Ò ÑÔÐ ÑÓÐ Ò ÖÑ Ó ÑÙÖÝ Ö ÕÙÐÝ ÝÐ ÚÓÐÐÝ Ýй ÔÖ

More information

Ì ÍÆÁÎ ÊËÁÌ ÌÁË ÆÁ ˵ Ë Öº Ð º Ò Ö º ÚÓк ½ ÆÓº ½ ÔÖ Ð ¾¼¼¾ ½ ¹ ½ ÐÓ Ò Ò ÅÙÐØ ¹ ÀÞ ÒÚ ÖÓÒÑ ÒØ ÎÓ Ò º Ç ÐÓ Þ ÁÒÚ Ø È Ô Ö ØÖ Ø Ò ÓÚ ÖÚ Û Ó ÐÓ Ò Ò Ò Ó ÐÓ ØÓÖ Ð Ñ ÒØ ÔÖ ÒØ º ËÝ Ø Ñ Ø Ò Ó Ô¹ ÓÔ ÜÔÐ Ò Û ÐÐ Ø

More information

ÁÆÎÆÌÇÊ ÇÆÌÊÇÄ ÍÆÊÌÁÆ ÅƵ ÑÒ ÙÒÖØÒ Ø ÊÒ ÎÖÒ Ó ÊÒ Ø Á ¼ ÈÊÇÍÌÁÇÆ ÈÄÆÆÁÆ Æ ÇÆÌÊÇÄ ÁÒÚÒØÓÖÝ ÓÒØÖÓÐ ÙÒÖØÒ ÑÒµ ÁÒØÖÓÙØÓÒ ÊÒÓÑ ÚÖØÓÒ ÑÔÓÖØÒØ ÔÖØÐ ÚÖØÓÒ ÈÖÓÐÑ ØÖÙØÙÖ ÑÔÐ ØÓ ÖÔÖ ÒØ ÖÒÓÑÒ Ò Ø ÑÓÐ Ê Æ ÍÒÚÖ ØÝ Ø

More information

Sliding Window ... Basic Window S[0] S[k 1] S[k] Digests Digests Digests

Sliding Window ... Basic Window S[0] S[k 1] S[k] Digests Digests Digests ËØØËØÖÑ ËØØ ØÐ ÅÓØÓÖ Ó ÌÓÙ Ó Ø ËØÖÑ ÊÐ ÌÑ ÙÝÙ Ù Ë ÓÙÖØ Á ØØÙØ Ó ÅØÑØÐ Ë ÔÖØÑØ Ó ÓÑÔÙØÖ Ë ÆÛ ÓÖ ÍÚÖ ØÝ ÝÙÝÙ ºÝÙºÙ ØÖØ Ó Ö Ø ÔÖÓÐÑ Ó ÑÓØÓÖ Ø Ó ØÓÙ Ó ØÑ Ö Ø ØÖÑ ÓÐ Ó Ñ Ó Ó ØѺ Á ØÓ ØÓ Ð ØÖÑ ØØ ¹ Ø Ù ÚÖ ØÖ

More information

Ë ÓÒ Ð ØÝ Ò Ö ÙÐØÙÖ Ð ÓÑÑÓ ØÝ ÙØÙÖ Ö Ø Ò Ë Ö Ò Ò Ô ÖØÑ ÒØ Ó Ò Ò ÓÔ Ò Ò Ù Ò Ë ÓÓÐ ÊÓ Ò ÖÒ ÐÐ ½ ù½ ¼ Ö Ö Ö ÒÑ Ö Ì Ä ½ ½ ½ ¼¼ ¹Ñ Ð Óº º Ñ Ö ½ Ì ÙØ ÓÖ Ø Ò ÓÖ ÐÔ ÙÐ Ø Ò ÖÓÑ Â Ô Ö ĐÙÐÓÛ Ò ÓÑÑ ÒØ Ò Ù Ø ÓÒ ÖÓÑ

More information

ÓÑÔ Ö Ø Ú ËØÙ Ý Ó ÌÛÓ ØÖÓÒÓÑ Ð ËÓ ØÛ Ö È Ò Ì Ø Ù Ñ ØØ Ò Ô ÖØ Ð ÙÐ ÐÐÑ ÒØ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö Ó Å Ø Ö Ó Ë Ò Ò ÓÑÔÙØ Ö Ë Ò Ì ÍÒ Ú Ö ØÝ Ó Ù Ð Ò ½ ÌÓ ÅÙÑ Ò Ò ØÖ Ø Ì Ø ÓÑÔ Ö Ø Ú ØÙ Ý Ó ØÛÓ ÓÔ Ò ÓÙÖ ØÖÓÒÓÑ

More information

ÔØ Ö ½ ÊÇÍÌÁÆ ÁÆ ÅÇ ÁÄ ÀÇ Æ ÌÏÇÊÃË Å Ãº Å Ö Ò Ò Ë Ñ Ö Êº Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò ËØ Ø ÍÒ Ú Ö ØÝ Ó Æ Û ÓÖ Ø ËØÓÒÝ ÖÓÓ ËØÓÒÝ ÖÓÓ Æ ½½ ¹ ¼¼ ØÖ Ø Æ ÒØ ÝÒ Ñ ÖÓÙØ Ò ÓÒ Ó Ø Ý ÐÐ Ò Ò ÑÓ Ð Ó Ò ØÛÓÖ º ÁÒ Ø Ö ÒØ Ô

More information

Ò Ñ Ö Ð ÓÙÒ Ø ÓÒ ÓÖ ÙØÓÑ Ø Ï ÁÒØ Ö Ú ÐÙ Ø ÓÒ Ý Å ÐÓ Ý Ú ØØ ÁÚÓÖÝ ºËº ÈÙÖ Ù ÍÒ Ú Ö Øݵ ½ ź˺ ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ø Ö Ð Ýµ ½ ÖØ Ø ÓÒ Ù Ñ ØØ Ò ÖØ Ð Ø Ø ÓÒ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó È ÐÓ Ó Ý Ò ÓÑÙØ Ö

More information

PROCESSOR IS OCCUPIED BY T i

PROCESSOR IS OCCUPIED BY T i ËÙÐÒ ÐÓÖØÑ ÓÖ ÅÙÐØÔÖÓÖÑÑÒ Ò ÀÖ¹ÊйÌÑ ÒÚÖÓÒÑÒØ º ĺ ÄÙ ÈÖÓØ Å Å Ù ØØ ÁÒ ØØÙØ Ó ÌÒÓÐÓÝ ÂÑ Ïº ÄÝÐÒ ÂØ ÈÖÓÔÙÐ ÓÒ ÄÓÖØÓÖÝ ÐÓÖÒ ÁÒ ØØÙØ Ó ÌÒÓÐÓÝ ØÖØ Ì ÔÖÓÐÑ Ó ÑÙÐØÔÖÓÖÑ ÙÐÒ ÓÒ ÒÐ ÔÖÓ ÓÖ ØÙ ÖÓÑ Ø ÚÛÔÓÒØ Ó Ø ÖØÖ

More information

Client URL. List of object servers that contain object

Client URL. List of object servers that contain object ÄÓ Ø Ò ÓÔ Ó Ç Ø Í Ò Ø ÓÑ Ò Æ Ñ ËÝ Ø Ñ ÂÙ Ã Ò Ö Ù Ã Ø Ïº ÊÓ ÁÒ Ø ØÙØ ÙÖ ÓÑ ËÓÔ ÒØ ÔÓÐ Ö Ò Ò ÖÓ ÙÖ ÓѺ Ö Â Ñ Ïº ÊÓ ÖØ Ö Ò Ì Ð ÓÑ ß Æ Ì Á Ý Ð ÅÓÙÐ Ò ÙÜ Ö Ò ØÖ Ø ½ ÁÒØÖÓ ÙØ ÓÒ ÁÒ ÓÖ Ö ØÓ Ö Ù Ú Ö Ð Ý Ò Ò ¹

More information

ÓÒØÖÓÐ ËÝ Ø Ñ Ò Ò Ö Ò ÖÓÙÔ Ò ÙØÓÑ Ø ÓÒ Ì ÒÓÐÓ Ý ÖÓÙÔ Ö¹ÁÒ Ò Ö ÂÓ Ñ ÔÙØݵ Ø ØÖ ½ ¼ ¼ À Ò È ÓÒ ¼¾ ½¹ ¹½½¼¼ Ü ¼¾ ½¹ ¹ ¹Å Ð Ò Ö Ó Ñ ÖÒÙÒ ¹ Ò Ñ Ø «È ÓÒ ÓÒØÖÓÐ ËÝ Ø Ñ Ò Ò Ö Ò ÖÓÙÔ ÔйÁÒ Ò Ö Ó«Ö¹ÁÒ ÍÐÖ ÓÖ ÓÐØ

More information

Universitat Autònoma de Barcelona

Universitat Autònoma de Barcelona Universitat Autònoma de Barcelona ÙÐØ Ø Ò Ë Ó ³ Ò ÒÝ Ö ÁÒ ÓÖÑ Ø ÇÒ Ø Ò Ò ÓÒ ØÖÙØ ÓÒ Ó ÒØ¹Ñ Ø ÁÒ Ø ØÙØ ÓÒ Å Ñ ÓÖ ÔÖ ÒØ Ô Ö Ò ÂÙ Ò ÒØÓÒ Ó ÊÓ Ö Ù Þ Ù Ð Ö Ô Ö ÓÔØ Ö Ð Ö Ù ÓØÓÖ Ò ÒÝ Ö Ò ÁÒ ÓÖÑ Ø ÐÐ Ø ÖÖ Å ¾¼¼½

More information

ÓÒØÜع ÔÔÖÓ ÓÖ ÅÓÐ ÔÔÐØÓÒ ÚÐÓÔÑÒØ ÄÙØÓ ÆÙÖÓÓ ÁÖº ŵ ź˺ ÂÑ ÓÓµ Ì ÙÑØØ Ò ÙÐ ÐÐÑÒØ Ó Ø ÖÕÙÖÑÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó ÈÐÓ ÓÔÝ ËÓÓÐ Ó ÓÑÔÙØÖ ËÒ Ò ËÓØÛÖ ÒÒÖÒ ÅÓÒ ÍÒÚÖ ØÝ ÅÖ ¾¼¼½ ÐÖØÓÒ Ì Ø ÓÒØÒ ÒÓ ÑØÖÐ ØØ Ò ÔØ ÓÖ

More information

(a) Original Images. (b) Stitched Image

(a) Original Images. (b) Stitched Image ÁÅ Ê ÁËÌÊ ÌÁÇÆ ÁÆ ÌÀ Å ÌÄ ÆÎÁÊÇÆÅ ÆÌ Åº ÅÙ ÖÓÚ º ÈÖÓ Þ ÁÒ Ø ØÙØ Ó Ñ Ð Ì ÒÓÐÓ Ý Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ò Ò ÓÒØÖÓÐ Ò Ò Ö Ò ØÖ Ø Ì Ô Ô Ö ÚÓØ ØÓ ÔÓ Ð Ø Ó ÓÑ ØÖ ÑÓ Ø ÓÒ Ó Ñ ØÓ Ò Ð ÓÒÒ Ø ÓÒ Ó Ô Ö Ø Ò Ó ÓÚ ÖÐ Ý Ò Ñ

More information

Efficient Scheduling of Sporadic, Aperiodic, and Periodic Tasks with Complex Constraints

Efficient Scheduling of Sporadic, Aperiodic, and Periodic Tasks with Complex Constraints Efficient Scheduling of Sporadic, Aperiodic, and Periodic Tasks with Complex Constraints Damir Isović and Gerhard Fohler Department of Computer Engineering Mälardalen University, Sweden dic,gfr@mdh.se

More information

Æ ÒØ Ò Ö Ø ÓÒ Ó ÊÓØ Ø Ò ÏÓÖ ÓÖ Ë ÙÐ ÆÝ Ö Ø ÅÙ Ð ÂÓ ÒÒ Đ ÖØÒ Ö Ò ÏÓÐ Ò ËÐ ÒÝ ØÖ Øº Ò Ö Ø Ò ¹ÕÙ Ð ØÝ ÙÐ ÓÖ ÖÓØ Ø Ò ÛÓÖ ÓÖ Ö Ø Ð Ø Ò ÐÐ ØÙ Ø ÓÒ Û Ö ÖØ Ò Ø ÆÒ Ð Ú Ð ÑÙ Ø Ù Ö¹ ÒØ Ù Ò Ò Ù ØÖ Ð ÔÐ ÒØ Ó Ô Ø Ð

More information

Ø Ö ØÒ ÓÑÔ Ð Â Ú ÈÖÓ º ÓÒÒ Ø ÔÖÓÚ º Ø Þº µ ÔÖ Ð ¾ ¾¼¼½ ØÖ Ø ÓÖ ÕÙ Ø ÓÑ Ø Ñ ÒÓÛ Ñ Ö Ó Â Ú Î ÖØÙ Ð Å Ò ÂÎÅ µ ÓÒ Â٠عÁÒ¹Ì Ñ ÂÁ̵ Ò ¹Ç ¹Ì Ñ Ç̵ ÓÑÔ Ð Ö Û Ø Óҹع Ý ÓÔØ Ñ Þ Ø ÓÒ Ú Ò ÙÒØ Ò Ø Ö ÈÖÓ ÙØ ÖÙÒÒ Ò

More information

Ê ÔÓÒ Ú Ì ÒÛ Ö Î Ù Ð Þ Ø ÓÒ Ó Ä Ö Ó Ö Ô Ø Ø Ý Ã ÒÒ Ø Ò ÖØ Ø ÓÒ Ù Ñ ØØ Ò Ô ÖØ Ð ÙÐ ÐÐÑ ÒØ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó È ÐÓ ÓÔ Ý Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Æ Û ÓÖ ÍÒ Ú Ö ØÝ Ë ÔØ Ñ Ö ¾¼¼¾ ÔÔÖÓÚ Ô Ã ÒÒ Ø Ò

More information

ÈÖ ÓÚÖÝ ÓÒ ÓÖÒ ÜÒ ÅÖØ ÛØ ÖÒØÐÐÝ ÁÒÓÖÑ ÌÖÖ ÖÒ ÂÓÒ ÍÒÚÖ ØÝ Ó Ñ ØÖÑ Ò ÈÊ ÊÓÒÐ ÅÙ Ö ÑÙ ÍÒÚÖ ØÝ ÊÓØØÖÑ ÈØÖ ËÓØÑÒ ÄÑÙÖ ÁÒ ØØÙØ Ó ÒÒÐ ÓÒÓÑ Ò ÈÊ ÁÖÑ ÚÒ ÄÙÛÒ ÄÑÙÖ ÁÒ ØØÙØ Ó ÒÒÐ ÓÒÓÑ Ì ÚÖ ÓÒ ÙÙ Ø ¾¼¼½ ØÖØ Ì ÔÔÖ

More information

ÆÆ ÄË Ç ÇÆÇÅÁ Ë Æ ÁÆ Æ ½ ß½¼¼ ¾¼¼¼µ ÁÒÚ ØÑ ÒØ ÀÓÖ ÞÓÒ Ò Ø ÖÓ Ë Ø ÓÒ Ó ÜÔ Ø Ê ØÙÖÒ Ú Ò ÖÓÑ Ø ÌÓ ÝÓ ËØÓ Ü Ò È Ò¹ÀÙ Ò ÓÙ Ô ÖØÑ ÒØ Ó Ò Ò Æ Ø ÓÒ Ð ÒØÖ Ð ÍÒ Ú Ö ØÝ ÙÒ Ä Ì Û Ò ¾¼ Ù Ò¹Ä Ò À Ù Ô ÖØÑ ÒØ Ó Ò Ò Æ

More information

ÍÒ Ö Ø Ò Ò Ø ÒØ ÖÔÖ ÁÒ ÓÖÑ Ø ÓÒ ËÝ Ø Ñ Ì ÒÓÐÓ Ý Ó Ò ÊÈ Ö Ï Ò Ö ØØÔ»»ÛÛÛº Ò º Ù¹ ÖÐ Òº» Û Ò Ö ÁÒ Ø ØÙØ ĐÙÖ ÁÒ ÓÖÑ Ø Ö ÍÒ Ú Ö ØĐ Ø ÖÐ Ò Ì Ù ØÖº ¹½ ½ ÖÐ Ò ÖÑ ÒÝ ¹Ñ Ð Û Ò º Ù¹ ÖÐ Òº ÔÖ Ð ¾ ¾¼¼¼ ÌÙØÓÖ Ð Ø Ø

More information

ÌÖ Ò Ø ÓÒ¹ Ö Ò Ò ÅÒ ÑÓ ÝÒ È Ö¹ØÓ¹È Ö ËØ ÒÓ Ö Ô ËØÓÖ ËÝ Ø Ñ Ì ÑÓØ Ý ÊÓ Ó ½ Ò ËØ Ú Ò À Ò ¾ ¾ ½ ËÔÖ ÒØ Ú Ò Ì ÒÓÐÓ Ý Ä ÓÖ ØÓÖÝ ÙÖÐ Ò Ñ ¼½¼ ÍË ÍÒ Ú Ö ØÝ Ó Ñ Ö ÓÑÔÙØ Ö Ä ÓÖ ØÓÖÝ Ñ Ö ¼ Íà ØÖ Øº ÅÒ ÑÓ ÝÒ Ô Ö¹ØÓ¹Ô

More information

FRAME. ... Data Slot S. Data Slot 1 Data Slot 2 C T S R T S. No. of Simultaneous Users. User 1 User 2 User 3. User U. No.

FRAME. ... Data Slot S. Data Slot 1 Data Slot 2 C T S R T S. No. of Simultaneous Users. User 1 User 2 User 3. User U. No. ÂÓÙÖÒ ÐÓ ÁÒØ ÖÓÒÒ Ø ÓÒÆ ØÛÓÖ ÎÓк¾ ÆÓº½ ¾¼¼½µ ¹ ÏÓÖÐ Ë ÒØ ÈÙ Ð Ò ÓÑÔ ÒÝ È Ê ÇÊÅ Æ Î ÄÍ ÌÁÇÆÇ Ê ÉÍ ËÌ¹Ì Å» Å ÈÊÇÌÇ ÇÄ ÇÊÏÁÊ Ä ËËÆ ÌÏÇÊÃË ÒØ Ö ÓÖÊ Ö ÒÏ Ö Ð ÅÓ Ð ØÝ Ò Æ ØÛÓÖ Ò Ê ÏŠƵ Ô ÖØÑ ÒØÓ ÓÑÔÙØ ÖË Ò

More information

Ì È ÒÒ Ò ÌÖ Ò È Ö ËØÖÙØÙÖ ÒÒÓØ Ø ÓÒ Ó Ä Ö ÓÖÔÙ Æ ÒÛ Ò Ù Ù¹ ÓÒ ÓÙ Å ÖØ È ÐÑ Ö ÍÒ Ú Ö ØÝ Ó È ÒÒ ÝÐÚ Ò È Ð ÐÔ È ½ ½¼ ÍË ÜÙ Ò Û ÒÐ Òº ºÙÔ ÒÒº Ù Ü Ð Òº ºÙÔ ÒÒº Ù ÓÙ Ð Òº ºÙÔ ÒÒº Ù ÑÔ ÐÑ ÖÐ Òº ºÙÔ ÒÒº Ù ØÖ Ø

More information

ÆÓØ Ä ØÙÖ Ð Ñ Ø ØÖÙ ÙØ ÓÒ ØÓ Á ¼ ØÙ ÒØ ÓÖ ÐÐ ÓØ Ö Ö Ø Ö ÖÚ Á ¼ ÈÊÇ Í ÌÁÇÆ ÈÄ ÆÆÁÆ Æ ÇÆÌÊÇÄ Ê Æ Ô ÖØÑ ÒØ Ó ÁÒ Ù ØÖ Ð Ò Ò Ö Ò ÍÒ Ú Ö ØÝ Ø Ù«ÐÓ ¹ ËØ Ø ÍÒ Ú Ö ØÝ Ó Æ Û ÓÖ Ò Ù«ÐÓº Ù Á ¼ ÈÊÇ Í ÌÁÇÆ ÈÄ ÆÆÁÆ Æ

More information

The CMS Silicon Strip Tracker and its Electronic Readout

The CMS Silicon Strip Tracker and its Electronic Readout The CMS Silicon Strip Tracker and its Electronic Readout Markus Friedl Dissertation May 2001 ÖØ Ø ÓÒ Ì ÅË Ë Ð ÓÒ ËØÖ Ô ÌÖ Ö Ò Ø Ð ØÖÓÒ Ê ÓÙØ ÔÖ ÒØ Ò Ô ÖØ Ð ÙÐ ÐÐÑ ÒØ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö ÓØÓÖ Ó Ì Ò Ð

More information

ÔØ Ö Ê Ö ÓÐÓ Ý ÁÒ Ø ÔØ Ö Ø Ö Ñ Ò ÛÓÖ Ø Ø ÓÒ Ú ÐÓÔ ÔÖ ÒØ º Ì ÛÓÖ Ø ¹ Ø ÓÒ ÓÑÔÙØ Ö Ø ÒÓ Ø ÑÓ ÙÐ Û Ö Ø ÓÖÓÒ ÖÝ ØÖ ÑÓ Ð ÐÐ ÔÐ Ý Ò ÑÔÓÖØ ÒØ ÖÓÐ Û Ò Ó Ò ÙØÓÑ Ø Ú Ð Ò ÐÝ Û Ø ÓÖÓÒ ÖÝ Ò Ó Ö ¹ Ô Ý Ñ º Ì ÔØ Ö Ò Û

More information

Ì ÈÖ Ò Ó ËØÖ ÔÔ ÅÓÖØ ¹ Ë ÙÖ Ø Â Ó ÓÙ ÓÙ Å ØØ Û Ê Ö ÓÒ Ê Ö ËØ ÒØÓÒ Ò ÊÓ ÖØ º Ï Ø Ð Û Â ÒÙ ÖÝ ½ ØÖ Ø ÁÒØ Ö Ø ÓÒÐÝ Áǵ Ò ÔÖ Ò Ô Ð ÓÒÐÝ Èǵ ØÖ ÔÔ ÑÓÖØ ¹ ÙÖ Ø Å Ëµ Ö Ö Ú Ø Ú ÙÖ Ø Û Ô Ý ÓÙØ ÓÒÐÝ Ø ÒØ Ö Ø ÓÑÔÓÒ

More information

Ì ÈÒÒ ÝÐÚÒ ËØØ ÍÒÚÖ ØÝ Ì ÖÙØ ËÓÓÐ ÔÖØÑÒØ ÓËØØ Ø ËÌÊÌÁË ÇÊ Ì ÆÄËÁË ÏÁÌÀ ÌÏÇ ÌÈË Ç ÅÁËËÁÆ ÎÄÍË Ì Ò ËØØ Ø Ý ÇÖ ÀÖÐ ¾¼¼ ÇÖ ÀÖÐ ËÙÑØØ Ò ÈÖØÐ ÙÐ ÐÐÑÒØ Ó Ø ÊÕÙÖÑÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó ÈÐÓ ÓÔÝ ÙÙ Ø ¾¼¼ Ì Ø Ó ÇÖ ÀÖÐ

More information

Bud row 1. Chips row 2. Coors. Bud. row 3 Milk. Chips. Cheesies. Coors row 4 Cheesies. Diapers. Milk. Diapers

Bud row 1. Chips row 2. Coors. Bud. row 3 Milk. Chips. Cheesies. Coors row 4 Cheesies. Diapers. Milk. Diapers Ð ØÖ ØÝ ÜØ ÖÒ Ð Ë Ñ Ð Ö ØÝ Ó Ø ÓÖ Ð ØØÖ ÙØ Ö ØÓÔ Ö Êº È ÐÑ Ö ½ Ò Ö ØÓ ÐÓÙØ Ó ¾ ¾ ½ Î Ú ÑÓ ÁÒº ¾ ÛÓÓ ÐÚ È ØØ ÙÖ È Ô ÐÑ ÖÚ Ú ÑÓºÓÑ ÓÑÔÙØ Ö Ë Ò Ô ÖØÑ ÒØ ÖÒ Å ÐÐÓÒ ÍÒ Ú Ö ØÝ ¼¼¼ ÓÖ Ú È ØØ ÙÖ È Ö ØÓ ºÑÙº Ù

More information

In Proceedings of the 1999 USENIX Symposium on Internet Technologies and Systems (USITS 99) Boulder, Colorado, October 1999

In Proceedings of the 1999 USENIX Symposium on Internet Technologies and Systems (USITS 99) Boulder, Colorado, October 1999 In Proceedings of the 999 USENIX Symposium on Internet Technologies and Systems (USITS 99) Boulder, Colorado, October 999 ÓÒÒ Ø ÓÒ Ë ÙÐ Ò Ò Ï Ë ÖÚ Ö Å Ö º ÖÓÚ ÐÐ ÊÓ ÖØ Ö Ò Ó Ó Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Ó

More information

Ø Ú ÉÙ Ù Å Ò Ñ ÒØ ÓÒ Ø Ú Æ ØÛÓÖ ¹ ÍÒ Ø ÓÒ Ø ÓÒ ÓÒØÖÓÐ ÈÖÓØÓÓÐ Ê Ö ØÖ Ë Ö Ã Ö Ñ Ñ Ñ Æ ØÛÓÖ Ò Ê Ö ÖÓÙÔ Ë ÓÓÐ Ó ÓÑÔÙØ Ò ÍÒ Ú Ö ØÝ Ó Ä Ä Ä˾ ÂÌ ÍÒ Ø Ã Ò ÓÑ ßÖ Ö Ö ÑÐÓÑԺРº ºÙ ØØÔ»»ÛÛÛºÓÑԺРº ºÙ» ØѹÑÑ ØÖ

More information

ÅÓÖ Ð À Þ Ö ÁÒ ÙÖ Ò Ò ËÓÑ ÓÐÐÙ ÓÒ ÁÒ Ð Ð Ö Ò Ò ¹ØÓ Ð ÖØ Å Ö Ø Ú Ö ÓÒ Ù Ù Ø ½ Ì Ú Ö ÓÒ ÖÙ ÖÝ ¾¼¼½ ØÖ Ø Ï ÓÒ Ö ÑÓ Ð Ó Ò ÙÖ Ò Ò ÓÐÐÙ ÓÒº Æ ÒØ Ö Ö Ò Ö ÕÙ Ö Ø ÓÒ ÙÑ Ö ØÓ Ø ÑÓÒ Ø ÖÝ ÓÑÔ Ò Ø ÓÒ Ò Ó ÐÓ º ÙØ Ø

More information

ÔÔÖ Ò ÂÓÙÖÒÐ Ó ÓÑÔÙØÖ Ò ËÝ ØÑ ËÒ ÎÓк ½ ÆÓº ¾¼¼¼ ÔÔº ¾ß º ÈÖÐÑÒÖÝ ÚÖ ÓÒ Û Ò ÚÒ Ò ÖÝÔØÓÐÓÝ ß ÖÝÔØÓ ÈÖÓÒ ÄØÙÖ ÆÓØ Ò ÓÑÔÙØÖ ËÒ ÎÓк º ÑØ º ËÔÖÒÖ¹ÎÖÐ ½º Ì ËÙÖØÝ Ó Ø ÔÖ ÐÓ ÒÒ Å ÙØÒØØÓÒ Ó ÅÖ ÐÐÖ ÂÓ ÃÐÒ Ý ÈÐÐÔ

More information

ÅÁÌ ½ º ÌÓÔ Ò Ì Ë ÁÒØ ÖÒ Ø Ê Ö ÈÖÓ Ð Ñ ËÔÖ Ò ¾¼¼¾ Ä ØÙÖ ½ ÖÙ ÖÝ ¾¼¼¾ Ä ØÙÖ Ö ÌÓÑ Ä ØÓÒ ËÖ ÇÑ Ö Ø ÑÓÒ Ï Ð ½º½ ÁÒØÖÓ ÙØ ÓÒ Ì Ð Û ÐÐ Ù Ú Ö Ð Ö Ö ÔÖÓ Ð Ñ Ø Ø Ö Ö Ð Ø ØÓ Ø ÁÒØ ÖÒ Øº Ð ØÙÖ Û ÐÐ Ù ÀÓÛ Ô ÖØ ÙÐ

More information

Ê ½µ ¼»¼»¼½ ÓÑÔÙØÖ ËÒ»ÅØÑØ ½ Ô Ê Ö ÊÔÓÖØ Ì ÈÊËÍË ËÝ ØÑ ÖØØÙÖ ÖØ ÈØÞÑÒÒ ½ ÂÑ ÊÓÖÒ ¾ Ö ØÒ ËØÐ ½ ÅÐ ÏÒÖ ¾ ÖÒ ÏÖ ½ ÍÒÚÖ ØØ ËÖÐÒ ÁÑ ËØØÛÐ ¹½¾ ËÖÖÒ ÖÑÒÝ ßÔØÞÑÒÒ ØÙÐÐ ºÙÒ¹ º ¾ ÁÅ ÙÖ Ê Ö ÄÓÖØÓÖÝ ËÙÑÖ ØÖ À¹¼ Ê

More information

ÉÙ ÖÝ Ò Ë Ñ ØÖÙØÙÖ Ø ÇÒ Ë Ñ Å Ø Ò Á Ë Ë Ê Ì Ì Á Ç Æ ÞÙÖ ÖÐ Ò ÙÒ Ñ Ò Ö ÓØÓÖ Ö ÖÙÑ Ò ØÙÖ Ð ÙÑ Öº Ö Öº Ò Øºµ Ñ ÁÒ ÓÖÑ Ø Ò Ö Ø Ò Ö Å Ø Ñ Ø ¹Æ ØÙÖÛ Ò ØÐ Ò ÙÐØĐ Ø ÁÁ ÀÙÑ ÓРعÍÒ Ú Ö ØĐ Ø ÞÙ ÖÐ Ò ÚÓÒ À ÖÖ Ôк¹ÁÒ

More information

ÁÒØÖÔÖØØÓÒ Ó Î ÙÐÐÝ ËÒ ÍÖÒ ÒÚÖÓÒÑÒØ ÓÖ ËйÖÚÒ Ö ÖØØÓÒ ÞÙÖ ÖÐÒÙÒ Ö ÓØÓÖ¹ÁÒÒÙÖ Ò Ö ÙÐØØ ÐØÖÓØÒ Ö ÊÙÖ¹ÍÒÚÖ ØØ ÓÙÑ ÖÒ ÈØÞÓÐ ËØÙØØÖØ»ÓÙÑ ËÔØÑÖ ¾¼¼¼ ÊÖÒØÒ ÈÖÓº Öº¹ÁÒº ÏÖÒÖ ÚÓÒ ËÐÒ ÁÒ ØØÙØ Ö ÆÙÖÓÒÓÖÑØ ÄÖ ØÙÐ

More information

(a) Hidden Terminal Problem. (b) Direct Interference. (c) Self Interference

(a) Hidden Terminal Problem. (b) Direct Interference. (c) Self Interference ØÖ ÙØ ÝÒ Ñ ÒÒ Ð Ë ÙÐ Ò ÓÖ ÀÓ Æ ØÛÓÖ ½ Ä ÙÒ Ó Ò ÂºÂº Ö ¹ÄÙÒ ¹ Ú Ë ÓÓÐ Ó Ò Ò Ö Ò ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ë ÒØ ÖÙÞ ¼ ¹Ñ Ð ÓÐ Ó ºÙ º Ù Î Ö ÓÒ ¼»½»¾¼¼¾ Ì Ö ØÝÔ Ó ÓÐÐ ÓÒ¹ Ö ÒÒ Ð ÔÖÓØÓÓÐ ÓÖ Ó Ò ØÛÓÖ Ö ÔÖ ÒØ º Ì ÔÖÓØÓÓÐ

More information

ØÙÖ Ò Ö Ø ÓÒ Ý ÁÑ Ø Ø ÓÒ ÖÓÑ ÀÙÑ Ò Ú ÓÖ ØÓ ÓÑÔÙØ Ö Ö Ø Ö Ò Ñ Ø ÓÒ ÖØ Ø ÓÒ ÞÙÖ ÖÐ Ò ÙÒ Ö Ó ØÓÖ Ö ÁÒ Ò ÙÖÛ Ò Ø Ò Ö Æ ØÙÖÛ Ò ØÐ ¹Ì Ò Ò ÙÐØĐ Ø Ò Ö ÍÒ Ú Ö ØĐ Ø Ë ÖÐ Ò ÚÓÖ Ð Ø ÚÓÒ Å Ð Ã ÔÔ Ë Ö ÖĐÙ Ò ¾¼¼ Ò ÎÓÖ

More information

universe nonself self detection system false negatives false positives

universe nonself self detection system false negatives false positives Ö Ø ØÙÖ ÓÖ Ò ÖØ Ð ÁÑÑÙÒ ËÝ Ø Ñ ËØ Ú Ò º ÀÓ Ñ ÝÖ ½ Ò Ëº ÓÖÖ Ø ½ ¾ ½ Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò ÍÆÅ Ð ÙÕÙ ÖÕÙ ÆÅ ½ ½ ¾ Ë ÒØ ÁÒ Ø ØÙØ ½ ÀÝ È Ö ÊÓ Ë ÒØ ÆÅ ¼½ ØÖ Ø Ò ÖØ Ð ÑÑÙÒ Ý Ø Ñ ÊÌÁ˵ Ö Û ÒÓÖÔÓÖ Ø Ñ ÒÝ ÔÖÓÔ

More information

Author manuscript, published in "1st International IBM Cloud Academy Conference - ICA CON 2012 (2012)" hal-00684866, version 1-20 Apr 2012

Author manuscript, published in 1st International IBM Cloud Academy Conference - ICA CON 2012 (2012) hal-00684866, version 1-20 Apr 2012 Author manuscript, published in "1st International IBM Cloud Academy Conference - ICA CON 2012 (2012)" Á ÇÆ ¾¼½¾ ÌÓÛ Ö Ë Ð Ð Ø Å Ò Ñ ÒØ ÓÖ Å Ô¹Ê Ù ¹ Ø ¹ÁÒØ Ò Ú ÔÔÐ Ø ÓÒ ÓÒ ÐÓÙ Ò ÀÝ Ö ÁÒ Ö ØÖÙØÙÖ Ö Ð ÒØÓÒ

More information

ÔØÖ ÄÒÖ Ç ÐÐØÓÖ ß ÇÒ Ö Ó ÖÓÑ º½ ÇÚÖÚÛ ÏØ Ó Ø ØÒ Ú Ò ÓÑÑÓÒ ÔÖÓÔØÓÒ Ó Ñ ÛÚ ÒÖØ Ý Öع ÕÙ ÖÑÓØ ØØÓÒ Ó ÓÑÔÐÜ ÑÓÐÙÐ Ú ÒÖÖ ÔØÖ Ø ÐØÖ Ò ÑÒØ Ð Ò ÑÖÓÛÚ ÚØÝ Ò ÖÒØÖ ÐÓ Ì ÙÑÐ ÑÔÐ ÖÑÓÒ Ó Ð¹ ÐØÓÖ ÔÐÝ ØÖÖÒ ÖÓÐ Ò Ø ÙÒÖ

More information

Å Ò Ñ ÒØ Ö Ø ØÙÖ Ö Ñ ÛÓÖ ÓÖ Ø Ú Æ ØÛÓÖ Ð ÒϺ ÓÒ Â Ñ Èº ºËØ Ö ÒÞ Ñ Ñ Ò Ð Ü Ò ÖκÃÓÒ Ø ÒØ ÒÓÙ ÆÌ ÒÓÐÓ Î Ö ÞÓÒ ÓÐÙÑ ÍÒ Ú Ö ØÝÝ ¼ÂÙÒ ¾¼¼ ÝØ ÊÄÙÒ ÖÓÒØÖ Ø ¼ ¼¾¹ ¹ ¹¼½ ½º Ì ÛÓÖ Û ÔÓÒ ÓÖ ÝØ Ò Ú Ò Ê Ö ÈÖÓ Ø ÒÝ

More information

ÌÀ ÀÁ¹ÇÅÈÊÇÅÁË ÎÄÍ ÇÊ ÆÇÆßÌÊÆËÊÄ ÍÌÁÄÁÌ ÅË Ý Ù ØÚÓ ÖÒØÒÓ Ò ÂÓÖ Å Ó Ý ÏºÈº ͹Á º¼¼ ÖÙÖÝ ¾¼¼¼ ØÖØ Ï ÒØÖÓÙ Ò ØÙÝ ÓÑÔÖÓÑ ÚÐÙ ÓÖ ÒÓÒ¹ØÖÒ ÖÐ ÙØÐØÝ Ñ Ø ¹ÓÑÔÖÓÑ ÚÐÙº ÁØ ÐÓ ÐÝ ÖÐØ ØÓ Ø ÓÑÔÖÓ¹ Ñ ÚÐÙ ÒØÖÓÙ Ý ÓÖÑ

More information

4. Fixed-Priority Scheduling

4. Fixed-Priority Scheduling Simple workload model 4. Fixed-Priority Scheduling Credits to A. Burns and A. Wellings The application is assumed to consist of a fixed set of tasks All tasks are periodic with known periods This defines

More information

ÓÒ ÖØÓÒ ÓÒ ÙÖÓÔÒ ÓÒÚÖ ÓÒ ÔÖÐÐÐ ÓÖÔÙ ÅÐÒ ÅÒ ÍÒÚÖ Ø ÈÚ ÑÐÒÑÒÑкÓÑ ÖÒ ¾ ÂÒÙÖÝ ¾¼¼ ½ ½µ ¾µ Ñ Ó Ø ÛÓÖ Ì ÛÓÖ ÒÐÝ Ø ÇÆÎÊË ÓÖ ÓÒÚÖÐ ÓÒ ØÖÙØÓÒ µ Û Ò ÓÙÒ Ò Ø Ç ÓÖÔÙ Ñ ÙÔ Ó Ø ØÖÒ ÐØÓÒ Ó ÚÒ ÔØÖ Ó Ó³ ÒÓÚÐ ÁÐ ÒÓÑ ÐÐ

More information

ÌÊÅ ÎÄÍ ÌÀÇÊ ÈÇÌÆÌÁÄ Æ ÄÁÅÁÌÌÁÇÆË Ë Æ ÁÆÌÊÌ ÊÁËà ÅÆÅÆÌ ÌÇÇÄ ÈÍÄ ÅÊÀÌË ÈÊÌÅÆÌ Ç ÅÌÀÅÌÁË ÌÀ ĐÍÊÁÀ ÈÙÐ ÑÖØ ÈÖÓ ÓÖ Ó ÅØÑØ Ø Ø ÌÀ ËÛ ÖÐ ÁÒ Ø¹ ØÙØ Ó ÌÒÓÐÓÝ ĐÙÖµ ÛÖ Ø Ò ÙÖÒ Ò ÒÒÐ ÑØÑع º À ÖÚ ÑØÑØ ÔÐÓÑ ÖÓÑ Ø

More information

Improving Web Performance by Client Characterization Driven Server Adaptation

Improving Web Performance by Client Characterization Driven Server Adaptation Improving Web Performance by Client Characterization Driven Server Adaptation Balachander Krishnamurthy AT&T Labs Research 180 Park Avenue Florham Park, NJ bala@research.att.com Craig E. Wills WPI 100

More information

Ä ØÙÖ ËÐ ÁÒÚ ØÑ ÒØ Ò ÐÝ ½ ÌÖ Ò Ò ÁÒØÖÓ ØÓ ÌË Ó Ð ØÖ Ò Ø ÖÑ ÒÓÐÓ Ý ÜÔÐ Ò Ä Û Ó ÇÒ ÈÖ Ò Ö ØÖ ÐÙÐ Ø Ö ÔÐ Ø Ò ÔÓÖØ ÓÐ Ó Ó ÓÒ ÜÔÐ Ò Ö Ð Ø ÓÒ Ô Ö ØÖ Ò Ê ÔÐ Ø ÓÒ ËÔÓØ Ê Ø ÓÖÛ Ö Ê Ø Ä ØÙÖ ËÐ ÁÒÚ ØÑ ÒØ Ò ÐÝ ¾ ÇÖ

More information

ÀÖÖÐ ÈÐÑÒØ Ò ÆØÛÓÖ Ò ÈÖÓÐÑ ËÙÔØÓ Ù Ñ ÅÝÖ ÓÒ Ý ÃÑ ÅÙÒÐ Þ ÅÝ ½ ¾¼¼¼ ØÖØ ÁÒ Ø ÔÔÖ Û Ú Ø Ö Ø ÓÒ ØÒعÔÔÖÓÜÑØÓÒ ÓÖ ÒÙÑÖ Ó ÐÝÖ ÒØÛÓÖ Ò ÔÖÓÐÑ º Ï Ò Ý ÑÓÐÒ ÖÖÐ Ò ÛÖ Ö ÔÐ Ò ÐÝÖ Ò ÐÝÖ Ø Ü ÔÖÒØ Ó Ø ÑÒ ÓÙÒ Ñ ÖØ µº

More information

ENERGY SAVING SCHEDULING FOR EMBEDDED REAL-TIME LINUX APPLICATIONS

ENERGY SAVING SCHEDULING FOR EMBEDDED REAL-TIME LINUX APPLICATIONS ENERGY SAVING SCHEDULING FOR EMBEDDED REAL-TIME LINUX APPLICATIONS Claudio Scordino and Giuseppe Lipari Scuola Superiore Sant Anna Viale Rinaldo Piaggio, 34-56025 Pontedera - Pisa, Italy {scordino@gandalf.sssup.it,lipari@sssup.it}

More information

Downloaded from SPIE Digital Library on 29 Aug 2011 to 128.196.210.138. Terms of Use: http://spiedl.org/terms

Downloaded from SPIE Digital Library on 29 Aug 2011 to 128.196.210.138. Terms of Use: http://spiedl.org/terms ÔØ Ú ÓÒ ÖÝ Ñ ÖÖÓÖ ÓÖ Ø Ä Ö ÒÓÙÐ Ö Ì Ð ÓÔ º Ê Ö º Ö٠Ⱥ Ë Ð Ò Ö º ÐÐ Ò Êº ź Ò Ö ØØÓÒ ÀºÅº Å ÖØ Ò Ç ÖÚ ØÓÖ Ó ØÖÓ Ó Ö ØÖ Ä Ö Ó º ÖÑ ¼½¾ Ö ÒÞ ÁØ ÐÝ Ë ÁÒØ ÖÒ Ø ÓÒ Ð ºÖºÐº ÓÖ Ó ÈÖÓÑ ËÔÓ ¾» ¾¾¼ Ä Ó ÁØ ÐÝ Å ÖÓ

More information

ÆØÛÓÖ ÏÓÖÒ ÖÓÙÔ ÁÒØÖÒØ ÖØ ÜÔÖØÓÒ Ø ÙÙ Ø ¾¼¼¾ º ÓÖÐØØ ÉÇË ÁÒº ÁÖÚÒ ºÁº ÈÙÐÐÒ ÐÓÖÒ ÁÒ ØØÙØ Ó ÌÒÓÐÓÝ Ëº ËÖÓÓ ÆÓÖØÐ ÆØÛÓÖ Íà ËØØ Ø Ó ÇÒ¹ÏÝ ÁÒØÖÒØ ÈØ ÐÝ ÖعÓÖÐØعËØØ Ø ¹Ó¹ÔعÐÝ ¹¼¼ºØÜØ ½ ËØØÙ Ó Ø ÅÑÓ Ì ÓÙÑÒØ

More information

autocorrelation analysis

autocorrelation analysis ÌÓÛÖ ËÔ¹ÒÖØ ÖÝÔØÓÖÔ ÃÝ ÓÒ Ê ÓÙÖ ÓÒ ØÖÒ Ú ÜØÒ ØÖص Ò ÅÓÒÖÓ ÅРú ÊØÖ Ý É Ä ÒРȺ ÄÓÔÖ Ø ÐÒ Ë ØÖØ ÈÖÓÖÑÑÐ ÑÓÐ ÔÓÒ Ò ÔÖ ÓÒÐ ØÐ ØÒØ È µ ÛØ ÑÖÓÔÓÒ ÔÖÑØ ÚÓ¹ ÖÚÒ Ù Ö ÒØÖ Ò Û Ù Ö ÔÖÓÚ Ò¹ ÔÙØ Ý ÔÒº ÁÒ Ø ÔÔÖ Û ÓÛÓÛØÓܹ

More information

TheHow and Why of Having a Successful Home Office System

TheHow and Why of Having a Successful Home Office System ÊÇÄ ¹ Ë ËË ÇÆÌÊÇÄ ÇÆ ÌÀ Ï ÍËÁÆ Ä È ÂÓÓÒ Ëº È Ö ÁÒ ÓÖÑ Ø ÓÒ Ò ËÓ ØÛ Ö Ò Ò Ö Ò Ô ÖØÑ ÒØ ÓÖ Å ÓÒ ÍÒ Ú Ö ØÝ Ô Ö Ø ºÒÖÐºÒ ÚÝºÑ Ð Ð¹ÂÓÓÒ Ò ÓÐÐ Ó ÁÒ ÓÖÑ Ø ÓÒ Ì ÒÓÐÓ Ý ÍÒ Ú Ö ØÝ Ó ÆÓÖØ ÖÓÐ Ò Ø ÖÐÓØØ ÒÙÒº Ù Ê Ú

More information

Resource Management for Scalable Disconnected Access to Web Services

Resource Management for Scalable Disconnected Access to Web Services Resource Management for Scalable Disconnected Access to Web Services Bharat Chandra, Mike Dahlin, Lei Gao, Amjad-Ali Khoja Amol Nayate, Asim Razzaq, Anil Sewani Department of Computer Sciences The University

More information

application require ment? reliability read/write caching disk

application require ment? reliability read/write caching disk Í Ò Ê ÑÓØ Å ÑÓÖÝ ØÓ ËØ Ð Ø Æ ÒØÐÝ ÓÒ Ò Ì¾ Ä ÒÙÜ Ð ËÝ Ø Ñ Ö Ò Ó Ö Ð ÖÓ Ï Ð Ö Ó ÖÒ Ö È Ó Ò Ì Ø Ò ËØ Ò ÍÒ Ú Ö Ö Ð È Ö ÓÓÖ Ò Ó È Ó ¹ Ö Ù Ó Ñ ÁÒ ÓÖÑ Ø Úº ÔÖ Ó Î ÐÓ Ó»Ò Ó ÓÓÒ Ó ½¼ ¹ ¼ ÑÔ Ò Ö Ò È Ö Þ Ð Ì Ð µ

More information

Applications. Decode/ Encode ... Meta- Data. Data. Shares. Multi-read/ Multi-write. Intermediary Software ... Storage Nodes

Applications. Decode/ Encode ... Meta- Data. Data. Shares. Multi-read/ Multi-write. Intermediary Software ... Storage Nodes ËÐØÒ Ø ÊØ Ø ØÖÙØÓÒ ËÑ ÓÖ ËÙÖÚÚÐ ËØÓÖ ËÝ ØÑ ÂÝ Âº ÏÝÐ ÅÑØ ÐÓÐÙ ÎÝ ÈÒÙÖÒÒ ÅРϺ Ö ËÑ ÇÙÞ ÃÒ ÌÛ ÓÖÝ ÏÐÐÑ ÖÓÖÝ Êº ÒÖ ÈÖÔ Ãº ÃÓ Ð ÅÝ ¾¼¼½ Å͹˹¼½¹½¾¼ ËÓÓÐ Ó ÓÑÔÙØÖ ËÒ ÖÒ ÅÐÐÓÒ ÍÒÚÖ ØÝ ÈØØ ÙÖ È ½¾½ ØÖØ ËÙÖÚÚÐ

More information

ÅÓÖÐ ÀÞÖ ÅÖØ ÈÓÛÖ Ò ËÓÒ Ø ÀÐØ ÁÒ ÙÖÒ Ý ÖØÓРͺ ÏÖ ÔÖØÑÒØ Ó ÓÒÓÑ ÍÒÚÖ ØÝ Ó ÅÒÒÑ ¹½ ½ ÅÒÒÑ ÛÖÓÒºÙÒ¹ÑÒÒѺ Ò ÅÖÙ ÒÐÙ ÎÖÒØ ÃÖÒÒÚÖ ÖÙÒ ¹½ ÅĐÙÒÒ ÑÖÙ ºÒÐÙÚÖÒغº ÙÙ Ø ¾¼¼½ ØÖØ ÁÒÚÙÐ ÑÓÖÐ ÞÖ ÒÒÖ Ý ÐØ Ò ÙÖÒ Ò ÑÓÒÓÔÓÐ

More information

Archiving Scientific Data

Archiving Scientific Data Archiving Scientific Data Peter Buneman Sanjeev Khanna Ý Keishi Tajima Þ Wang-Chiew Tan Ü ABSTRACT Ï ÔÖ ÒØ Ò Ö Ú Ò Ø Ò ÕÙ ÓÖ Ö Ö Ð Ø Û Ø Ý ØÖÙØÙÖ º ÇÙÖ ÔÔÖÓ ÓÒ Ø ÒÓ¹ Ø ÓÒ Ó Ø Ñ Ø ÑÔ Û Ö Ý Ò Ð Ñ ÒØ ÔÔ Ö

More information

Primitives. Ad Hoc Network. (a) User Applications Distributed Primitives. Routing Protocol. Ad Hoc Network. (b)

Primitives. Ad Hoc Network. (a) User Applications Distributed Primitives. Routing Protocol. Ad Hoc Network. (b) Ï Ö Ð Æ ØÛÓÖ ¼ ¾¼¼½µ ß ½ ÅÙØÙ Ð ÜÐÙ ÓÒ Ð ÓÖ Ø Ñ ÓÖ ÀÓ ÅÓ Ð Æ ØÛÓÖ Â ÒÒ Ö º Ï ÐØ Ö Â ÒÒ Ö Äº Ï Ð Æ Ø Ò Àº Î Ý Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Ì Ü ²Å ÍÒ Ú Ö ØÝ ÓÐÐ ËØ Ø ÓÒ Ì ¹ ½½¾ ¹Ñ Ð ÒÒÝÛ ºØ ÑÙº Ù Û Ð ºØ ÑÙº Ù

More information

Application. handle layer. access layer. reference layer. transport layer. ServerImplementation. Stub. Skeleton. ClientReference.

Application. handle layer. access layer. reference layer. transport layer. ServerImplementation. Stub. Skeleton. ClientReference. ÜÔÐÓ Ø Ò Ç Ø ÄÓ Ð ØÝ Ò Â Ú È ÖØÝ ØÖ ÙØ ÓÑÔÙØ Ò ÒÚ ÖÓÒÑ ÒØ ÓÖ ÏÓÖ Ø Ø ÓÒ ÐÙ Ø Ö ÖÒ Ö À ÙÑ Ö Ò Å Ð È Ð ÔÔ Ò ÍÒ Ú Ö ØÝ Ó Ã ÖÐ ÖÙ ÖÑ ÒÝ ÙÑ Ö ºÙ º Ò Ô Ð ÔÔ Ö ºÙ º ØØÔ»»ÛÛÛ Ô º Ö ºÙ º»Â Ú È ÖØÝ» ØÖ Øº ÁÒ ØÖ

More information

ÁÒÖÒ ÓÖ Ó ÖÚØÓÒ Ó ÒØÖØ «Ù ÓÒ ÔÖÓ º ËÙ ÒÒ ØÐÚ Ò ÔÖØÑÒØ Ó Ó ØØ Ø ÅÐ ËÖÒ Ò ÔÖØÑÒØ Ó ËØØ Ø Ò ÇÔÖØÓÒ Ê Ö ÍÒÚÖ ØÝ Ó ÓÔÒÒ ÒÑÖ ØÖØ ØÑØÓÒ Ó ÔÖÑØÖ Ò «Ù ÓÒ ÑÓÐ Ù ÙÐÐÝ ÓÒ Ó Ö¹ ÚØÓÒ Ó Ø ÔÖÓ Ø ÖØ ØÑ ÔÓÒØ º ÀÖ Û ÒÚ ØØ

More information

Ì Ë Ø ÅÄ Ë Ö Ò Ò Ò Ò ÅÄ ÉÙ ÖÝ Ò Ñ Ö Ò Ò Ò Ó Ò ÒØ ÓÒÝ ÂÓ Ô Ö Ú Ò Ò º Ö Ð Ýº Ù Ê ÔÓÖØ ÆÓº Í» Ë ¹¼¼¹½½½¾ Ë ÔØ Ñ Ö ¾¼¼¼ ÓÑÔÙØ Ö Ë Ò Ú ÓÒ Ëµ ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ö Ð Ý Ð ÓÖÒ ¾¼ Ì Ë Ø ÅÄ Ë Ö Ò Ò Ò Ò ÅÄ ÉÙ ÖÝ Ò

More information

ÓÑÔ Ö Ø Ú Ê Ú Û Ó ÊÓ ÓØ ÈÖÓ Ö ÑÑ Ò Ä Ò Ù ÁÞÞ Ø È Ñ Ö ÓÖÝ À Ö Ù Ù Ø ½ ¾¼¼½ ØÖ Ø ÁÒ Ø Ô Ô Ö Û Ñ ÓÑÔ Ö Ø Ú Ö Ú Û Ó Ú Ö ØÝ Ó ÒØ ÖÑ Ø ¹Ð Ú Ð ÖÓ ÓØ Ð Ò Ù Ø Ø Ú Ñ Ö Ò Ö ÒØ Ý Ö º Ï Ð Ó Ö ÖÓ ÓØ ÔÖÓ Ö ÑÑ Ò Ð Ò Ù

More information

PROTOCOLS FOR SECURE REMOTE DATABASE ACCESS WITH APPROXIMATE MATCHING

PROTOCOLS FOR SECURE REMOTE DATABASE ACCESS WITH APPROXIMATE MATCHING CERIAS Tech Report 2001-02 PROTOCOLS FOR SECURE REMOTE DATABASE ACCESS WITH APPROXIMATE MATCHING Wenliang Du, Mikhail J. Atallah Center for Education and Research in Information Assurance and Security

More information

Real-Time Scheduling (Part 1) (Working Draft) Real-Time System Example

Real-Time Scheduling (Part 1) (Working Draft) Real-Time System Example Real-Time Scheduling (Part 1) (Working Draft) Insup Lee Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania www.cis.upenn.edu/~lee/ CIS 41,

More information

Real Business Cycles with Disequilibrium in the Labor Market: A Comparison of the U.S. and German Economies

Real Business Cycles with Disequilibrium in the Labor Market: A Comparison of the U.S. and German Economies Working Paper No. 5 Real Business Cycles with Disequilibrium in the Labor Market: A Comparison of the U.S. and German Economies by Gang Gong and Willi Semmler University of Bielefeld Department of Economics

More information

Chen Ding Yutao Zhong Computer Science Department University of Rochester Rochester, New York U.S.A. cding,ytzhong @cs.rochester.

Chen Ding Yutao Zhong Computer Science Department University of Rochester Rochester, New York U.S.A. cding,ytzhong @cs.rochester. ÓÑÔ Ð Ö¹ Ö Ø ÊÙÒ¹Ì Ñ ÅÓÒ ØÓÖ Ò Ó ÈÖÓ Ö Ñ Ø Chen Ding Yutao Zhong Computer Science Department University of Rochester Rochester, New York U.S.A. cding,ytzhong @cs.rochester.edu ABSTRACT ÙÖ Ø ÖÙÒ¹Ø Ñ Ò ÐÝ

More information

ÇÔ Ò ÈÖÓ Ð Ñ Ò Ø ¹Ë Ö Ò È Ö¹ØÓ¹È Ö ËÝ Ø Ñ Æ Ð Û Ò À ØÓÖ Ö ¹ÅÓÐ Ò Ò Ú ÖÐÝ Ò ËØ Ò ÓÖ ÍÒ Ú Ö ØÝ ËØ Ò ÓÖ ¼ ÍË Û Ò ØÓÖ Ý Ò º Ø Ò ÓÖ º Ù ØØÔ»»ÛÛÛ¹ º Ø Ò ÓÖ º Ù ØÖ Øº ÁÒ È Ö¹ÌÓ¹È Ö È¾Èµ Ý Ø Ñ ÙØÓÒÓÑÓÙ ÓÑÔÙØ Ö

More information

hospital physician(2)... disease(4) treat(2) W305(2) leukemia(3) leukemia(2) cancer

hospital physician(2)... disease(4) treat(2) W305(2) leukemia(3) leukemia(2) cancer Ë ÙÖ ÅÄ ÈÙ Ð Ò Û Ø ÓÙØ ÁÒ ÓÖÑ Ø ÓÒ Ä Ò Ø ÈÖ Ò Ó Ø ÁÒ Ö Ò Ó ÙÒ Ò Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò ÆÓÖØ Ø ÖÒ ÍÒ Ú Ö ØÝ Ä ÓÒ Ò ½½¼¼¼ Ò Ý Ò ÜÑ ÐºÒ Ùº ÙºÒ Ò Ä Ý Ë ÓÓÐ Ó ÁÒ ÓÖÑ Ø ÓÒ Ò ÓÑÔÙØ Ö Ë Ò ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ ÁÖÚ

More information

Lecture 3 Theoretical Foundations of RTOS

Lecture 3 Theoretical Foundations of RTOS CENG 383 Real-Time Systems Lecture 3 Theoretical Foundations of RTOS Asst. Prof. Tolga Ayav, Ph.D. Department of Computer Engineering Task States Executing Ready Suspended (or blocked) Dormant (or sleeping)

More information

HowPros and Cons of Owning a Home-Based Business

HowPros and Cons of Owning a Home-Based Business ÄØ Ø ÊÚ ÓÒ ÅÖ ¾½ ¾¼¼½ ÓÑÑÒØ ÏÐÓÑ ÖÑ Ò ÅÒÖÐ ÁÒÒØÚ ØÓ ÅÒÔÙÐØ Ø ÌÑÒ Ó ÈÖÓØ Ê ÓÐÙØÓÒ Ú ÀÖ ÐÖ ÌÖÙÒ ÓÖ ËÓÒÝÓÒ ÄÑ Ï ØÒ º ÕÙØ º ÖÓÚØ Ëº ÒÒ Åº ÖÒÒÒ Àº Ó º ÓÛÖÝ ÈºÙÐÖ Êº ÀÒРº ÀÖ ÐÖ º ÄÑÒÒ Åº ÅØÐÐ ÁºÈÒ ºÊ ÑÙ Ò

More information

Optimal Crawling Strategies for Web Search Engines

Optimal Crawling Strategies for Web Search Engines Optimal Crawling Strategies for Web Search Engines J.L. Wolf, M.S. Squillante, P.S. Yu IBM Watson Research Center ÐÛÓÐ Ñ Ô ÝÙÙ ºÑºÓÑ J. Sethuraman IEOR Department Columbia University jay@ieor.columbia.edu

More information

History-Based Batch Job Scheduling on a Network of Interactively Used Workstations

History-Based Batch Job Scheduling on a Network of Interactively Used Workstations À ØÓÖݹ Ø ÂÓ Ë ÙÐ Ò ÓÒ Æ ØÛÓÖ Ó ÁÒØ Ö Ø Ú ÐÝ Í ÏÓÖ Ø Ø ÓÒ ÁÒ Ù ÙÖ Ð ÖØ Ø ÓÒ ÞÙÖ ÖÐ Ò ÙÒ Ö ÏĐÙÖ Ò Ó ØÓÖ Ö È ÐÓ ÓÔ ÚÓÖ Ð Ø Ö È ÐÓ ÓÔ ¹Æ ØÙÖÛ Ò ØÐ Ò ÙÐØĐ Ø Ö ÍÒ Ú Ö ØĐ Ø Ð ÚÓÒ Ò Ö Ï Ô Ù Ë ĐÙÔ Ñ ÄÍ Ð ½ Ò Ñ

More information

desired behaviour (global constraints) composite system putative behaviour: putative agents, actions, etc.

desired behaviour (global constraints) composite system putative behaviour: putative agents, actions, etc. Ó Ð¹ Ö Ú Ò ÔÔÖÓ ØÓ Ö ÕÙ Ö Ñ ÒØ Ò Ò Ö Ò ËØ Û ÖØ Ö Ò Ø Û Öغ Ö ÒÙÛ º ºÙ Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ò ÍÒ Ú Ö ØÝ Ó Ø Ï Ø Ó Ò Ð Ò Ö ØÓÐ ØÖ Ø ÒÙÑ Ö Ó Ö ÒØ ÔÔÖÓ ØÓ Ö ÕÙ Ö Ñ ÒØ Ò Ò Ö Ò Ù Ø Ø Ø Ò Û Ô Ö Ñ Ñ Ö Ò ÙÔÓÒ Ø Ù Ó

More information

Curriculum Vitae. (last update: August 13 2005)

Curriculum Vitae. (last update: August 13 2005) Curriculum Vitae (last update: August 13 2005) Education November 1996: Laurea in Ingegneria Informatica (110/110 con lode) at University of Pisa. Thesis title: Progetto e Realizzazione di Meccanismi di

More information

Push-communities. Pull-communities. Wrapped Services ... ... processors hardwarecircuits peripherals PCshopping

Push-communities. Pull-communities. Wrapped Services ... ... processors hardwarecircuits peripherals PCshopping ÓÑÔÓ Ò Ò ÅÒØÒÒ Ï¹ ÎÖØÙÐ ÒØÖÔÖ ÓÙÐÑ ÒØÐÐ ½ Ò ÖÑ Å ¾ Ò ØÑÒ ÓÙÙØØÝ ¾ Ò Ñ ÐÑÖÑ Ò ÂÑ Ö ½ ËÓÓÐ Ó ÓÑÔÙØÖ ËÒ Ò ÒÒÖÒ ÍÒÚÖ ØÝ Ó ÆÛ ËÓÙØ ÏÐ Ù ØÖÐ ÓÙÐÑ ºÙÒ ÛºÙºÙ ÔÖØÑÒØ Ó ÓÑÔÙØÖ ËÒ ÈÙÖÙ ÍÒÚÖ ØÝ ÍË ºÔÙÖÙºÙ ¾ ÔÖØÑÒØ

More information

An Efficient Non-Preemptive Real-Time Scheduling

An Efficient Non-Preemptive Real-Time Scheduling An Efficient Non-Preemptive Real-Time Scheduling Wenming Li, Krishna Kavi and Robert Akl Department of Computer Science and Engineering The University of North Texas Denton, Texas 7623, USA {wenming, kavi,

More information

Finding Near Rank Deficiency in Matrix Products

Finding Near Rank Deficiency in Matrix Products TR-CS-98-13 Finding Near Rank Deficiency in Matrix Products Michael Stewart December 1998 Joint Computer Science Technical Report Series Department of Computer Science Faculty of Engineering and Information

More information

THE IMPACT OF PRODUCT RECOVERY ON LOGISTICS NETWORK DESIGN

THE IMPACT OF PRODUCT RECOVERY ON LOGISTICS NETWORK DESIGN R & D THE IMPACT OF PRODUCT RECOVERY ON LOGISTICS NETWORK DESIGN by M. FLEISCHMANN* P. BEULLENS** J. M. BLOEMHOF-RUWAARD and L. VAN WASSENHOVE 2000/33/TM/CIMSO 11 * Faculty of Business Administration,

More information

An Investigation of Geographic Mapping Techniques for Internet Hosts

An Investigation of Geographic Mapping Techniques for Internet Hosts An Investigation of Geographic Mapping Techniques for Internet Hosts Venkata N. Padmanabhan Microsoft Research Lakshminarayanan Subramanian Ý University of California at Berkeley ABSTRACT ÁÒ Ø Ô Ô Ö Û

More information

Partitioned real-time scheduling on heterogeneous shared-memory multiprocessors

Partitioned real-time scheduling on heterogeneous shared-memory multiprocessors Partitioned real-time scheduling on heterogeneous shared-memory multiprocessors Martin Niemeier École Polytechnique Fédérale de Lausanne Discrete Optimization Group Lausanne, Switzerland martin.niemeier@epfl.ch

More information

P1 P2 P3. Home (p) 1. Diff (p) 2. Invalidation (p) 3. Page Request (p) 4. Page Response (p)

P1 P2 P3. Home (p) 1. Diff (p) 2. Invalidation (p) 3. Page Request (p) 4. Page Response (p) ËÓØÛÖ ØÖÙØ ËÖ ÅÑÓÖÝ ÓÚÖ ÎÖØÙÐ ÁÒØÖ ÖØØÙÖ ÁÑÔÐÑÒØØÓÒ Ò ÈÖÓÖÑÒ ÅÙÖÐÖÒ ÊÒÖÒ Ò ÄÚÙ ÁØÓ ÔÖØÑÒØ Ó ÓÑÔÙØÖ ËÒ ÊÙØÖ ÍÒÚÖ ØÝ È ØÛÝ Æ ¼¹¼½ ÑÙÖÐÖ ØÓ ºÖÙØÖ ºÙ ØÖØ ÁÒ Ø ÔÔÖ Û Ö Ò ÑÔÐÑÒØØÓÒ Ó ÓØÛÖ ØÖÙØ ËÖ ÅÑÓÖÝ Ëŵ

More information

Predictable response times in event-driven real-time systems

Predictable response times in event-driven real-time systems Predictable response times in event-driven real-time systems Automotive 2006 - Security and Reliability in Automotive Systems Stuttgart, October 2006. Presented by: Michael González Harbour mgh@unican.es

More information

drop probability maxp

drop probability maxp ÓÑÔÖ ÓÒ Ó ÌÐ ÖÓÔ Ò ØÚ ÉÙÙ ÅÒÑÒØ ÈÖÓÖÑÒ ÓÖ ÙÐ¹Ø Ò Ï¹Ð ÁÒØÖÒØ ÌÖ ÒÐÙ ÁÒÒÓÒ Ö ØÓ ÖÒÙÖ ÌÓÑ ÐÖ Ö ØÓÔ ÓØ ËÖ ÅÖØÒ ÅÝ ËÔÖÒØ ÌÄ ÙÖÐÒÑ ÍË ßÓØ ÒÐÙÐ ÔÖÒØÐ ºÓÑ ËÐÞÙÖ Ê Ö Ù ØÖ ßÖ ØÓºÖÒÙÖ ÌÓÑ ºÐÖÐ ÐÞÙÖÖ ÖºØ ½ ÍÒÚÖ Ø

More information

} diff. } make. fetch. diff. (a) Standard LRC. (c) Home-based LRC. (b) AURC. Node 0 Node 1 Node 2 (home) Node 0 Node 1 Node 2 (home) Compute

} diff. } make. fetch. diff. (a) Standard LRC. (c) Home-based LRC. (b) AURC. Node 0 Node 1 Node 2 (home) Node 0 Node 1 Node 2 (home) Compute ÈÙÐ Ò Ø ÈÖÓÒ Ó Ø ¾Ò ËÝÑÔÓ ÙÑ Ó ÇÔÖØÒ ËÝ ØÑ Ò Ò ÁÑÔÐÑÒØØÓÒ ÇËÁ³µ ÈÖÓÖÑÒ ÚÐÙØÓÒ Ó ÌÛÓ ÀÓѹ ÄÞÝ ÊÐ ÓÒ ØÒÝ ÈÖÓØÓÓÐ ÓÖ ËÖ ÎÖØÙÐ ÅÑÓÖÝ ËÝ ØÑ ÙÒÝÙÒ ÓÙ ÄÚÙ ÁØÓ Ò Ã Ä ÔÖØÑÒØ Ó ÓÑÔÙØÖ ËÒ ÈÖÒØÓÒ ÍÒÚÖ ØÝ ÈÖÒØÓÒ ÆÂ

More information

Module 6. Embedded System Software. Version 2 EE IIT, Kharagpur 1

Module 6. Embedded System Software. Version 2 EE IIT, Kharagpur 1 Module 6 Embedded System Software Version 2 EE IIT, Kharagpur 1 Lesson 30 Real-Time Task Scheduling Part 2 Version 2 EE IIT, Kharagpur 2 Specific Instructional Objectives At the end of this lesson, the

More information

IBM Research Report. The State of the Art in Locally Distributed Web-server Systems

IBM Research Report. The State of the Art in Locally Distributed Web-server Systems RC22209 (W0110-048) October 16, 2001 Computer Science IBM Research Report The State of the Art in Locally Distributed Web-server Systems Valeria Cardellini, Emiliano Casalicchio Dept. of Computer Engineering

More information

Working Paper Simulating Tail Probabilities in GI/GI.1 Queues and Insurance Risk Processes with Subexponentail Distributions

Working Paper Simulating Tail Probabilities in GI/GI.1 Queues and Insurance Risk Processes with Subexponentail Distributions econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW Leibniz Information Centre for Economics Boots,

More information

Open Programmable Architecture for Java-enabled Network Devices

Open Programmable Architecture for Java-enabled Network Devices Open Programmable Architecture for Java-enabled Network Devices Tal Lavian, Nortel Networks - Advanced Technology Center Robert F. Jaeger, University of Maryland Jeffrey K. Hollingsworth, University of

More information

HowEasily Find the Best Lowest Price Possible For a Wedding

HowEasily Find the Best Lowest Price Possible For a Wedding Enabling Dynamic Content Caching for Database-Driven Web Sites K. Selçuk Candan Wen-Syan Li Qiong Luo Wang-Pin Hsiung Divyakant Agrawal C&C Research Laboratories, NEC USA, Inc., 110 Rio Robles, San Jose,

More information

Real-Time Scheduling 1 / 39

Real-Time Scheduling 1 / 39 Real-Time Scheduling 1 / 39 Multiple Real-Time Processes A runs every 30 msec; each time it needs 10 msec of CPU time B runs 25 times/sec for 15 msec C runs 20 times/sec for 5 msec For our equation, A

More information

174: Scheduling Systems. Emil Michta University of Zielona Gora, Zielona Gora, Poland 1 TIMING ANALYSIS IN NETWORKED MEASUREMENT CONTROL SYSTEMS

174: Scheduling Systems. Emil Michta University of Zielona Gora, Zielona Gora, Poland 1 TIMING ANALYSIS IN NETWORKED MEASUREMENT CONTROL SYSTEMS 174: Scheduling Systems Emil Michta University of Zielona Gora, Zielona Gora, Poland 1 Timing Analysis in Networked Measurement Control Systems 1 2 Introduction to Scheduling Systems 2 3 Scheduling Theory

More information