Statically analyzing real-timesystems normally involves a high degree of pessimism, but it is necessary in systems requiring 100% guarantee. However, lots of less critical systems would significantly benefit from com...
详细信息
ISBN:
(纸本)3540219749
Statically analyzing real-timesystems normally involves a high degree of pessimism, but it is necessary in systems requiring 100% guarantee. However, lots of less critical systems would significantly benefit from combining such static analysis with empirical tests. Empirical tests are based on observing the system at run time and extracting information about its temporal behavior. In this sense, this paper presents a generic and extensible framework that permits the extraction of temporal properties of real-timesystems by analyzing their run-time traces. the analysis is based on event-recognition finite state machines that compute the temporal properties with a computational cost of O(1) per observed event in most of the cases. the framework is instantiated in order to extract some typical temporal properties (such as computation time or response time of tasks), which can serve as a template to define new ones. Finally, the paper also shows how the framework can be implemented on a real system, exclusively using state-of-the-art technology;in particular, the Trace and real-time Extensions of the POSIX standard.
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPoint™ or Acrobat™) from which they were generated. the images are captured either by tapping ...
详细信息
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPoint™ or Acrobat™) from which they were generated. the images are captured either by tapping the video output from a laptop connected to a projector or by taking a picture of what's displayed on the screen in a conference room. the matching algorithm extracts features from the image data, including OCR output, edges, projection profiles, and layout and determines the symbolic file that contains the most similar collection of features. this algorithm enables several unique applications for enhancing a meeting in real-time and accessing the audio and video that were recorded while a presentation was being given. these applications include the simultaneous translation of presentation slides during a meeting, linking video clips inside a PowerPoint file that show how each slide was described by the presenter, and retrieving presentation recordings using digital camera images as queries.
Some real-timesystems are designed to deliver services to objects that are controlled by external sources. their services must be delivered on a timely basis, and the system fails when some services are delivered too...
详细信息
ISBN:
(纸本)0769519806
Some real-timesystems are designed to deliver services to objects that are controlled by external sources. their services must be delivered on a timely basis, and the system fails when some services are delivered too late. Such a System may fail if the timing requirements which it is designed to meet are erroneous. It may under-utilize resources and, consequently, be costly or unreliable if the requirements are too stringent. In general, the timing requirements of the system may change when the states of the objects monitored by the system change. Hence, one must identify how changes in object states call for changes in system requirements and how these changes should be incorporated in the design and implementation of the system. this paper first describes a methodology to determine timing requirements and to take into account of requirement changes at runtime. the method is based on several timing requirement determination schemes. Simulation data show that these schemes are effective for applications such as mobile IP hand-offs. the paper then discusses how to incorporate this methodology in the design of such systems and in the development process.
Traditionally, control systems use ad hoc techniques such as shared internal data structures, to store control data. However, due to the increasing data volume in control systems, these internal data structures become...
详细信息
ISBN:
(纸本)3540219749
Traditionally, control systems use ad hoc techniques such as shared internal data structures, to store control data. However, due to the increasing data volume in control systems, these internal data structures become increasingly difficult to maintain. A real-time database management system can provide an efficient and uniform way to structure and access data. However the drawback with database management systems is the overhead added when accessing data. In this paper we introduce a new concept called database pointers, which provides fast and deterministic accesses to data in hard real-time database management systems compared to traditional database management systems. the concept is especially beneficial for hard real-time control systems where many control tasks each use few data elements at high frequencies. Database pointers can co-reside with a relational data model, and any updates made from the database pointer interface are immediately visible from the relational view. We show the efficiency with our approach by comparing it to tuple identifiers and relational processing.
Controller Area Network (CAN) is a serial communications protocol for transmitting short control messages in a real-timeembedded system [1]. For larger messages, several higher-level protocols have been proposed. the...
详细信息
real-time content-based access to live video data requires content analysis applicationsthat are able to process the video data at least as fast as the video data is made available to the application and with an acce...
详细信息
real-time content-based access to live video data requires content analysis applicationsthat are able to process the video data at least as fast as the video data is made available to the application and with an acceptable error rate. Statements as this express quality of service (QoS) requirements to the application. In order to provide some level of control of the QoS provided, the video content analysis application must be scalable and resource aware so that requirements of timeliness and accuracy can be met by allocating additional processing resources. In this paper we present a general architecture of video content analysis applications including a model for specifying requirements of timeliness and accuracy. the salient features of the architecture include its combination of probabilistic knowledge-based media content analysis with QoS and distributed resource management to handle QoS requirements, and its independent scalability at multiple logical levels of distribution. We also present experimental results with an algorithm for QoS-aware selection of configurations of feature extractor and classification algorithms that can be used to balance requirements of timeliness and accuracy against available processing resources. Experiments with an implementation of a real-time motion vector based object-tracking application, demonstrate the scalability of the architecture.
Many industrial real-timesystems have evolved over a long period of time and were initially so simple that it was possible to predict consequences of adding new functionality by common sense. However, as the system e...
详细信息
ISBN:
(纸本)3540219749
Many industrial real-timesystems have evolved over a long period of time and were initially so simple that it was possible to predict consequences of adding new functionality by common sense. However, as the system evolves the possibility to predict the consequences of changes become more and more difficult unless models and analysis method can be used. In this paper we describe our approach to re-introducing analyzability into a complex real-time control system at ABB Robotics. the system consists of about 2 500 000 lines of code. Traditional real-time models and analyses, e.g. fixed priority analysis, were not applicable on this large and complex real-time system since the models are too simple for describing the system's behavior accurately, and the analyses are too pessimistic. the proposed method is based on analytical models and discrete-event based simulation of the system behavior based on these models. the models describe execution times as statistical distributions which are measured and calculated in the existing system. Simulation will not only enable models with statistical execution times, but also correctness criterion other than meeting deadlines, e.g. non-empty communication queues. Having accurate system models enable analysis of the impact on the temporal behavior of, e.g. customizing or maintaining the software. the case study presented in the paper shows the feasibility of the method. the method presented is applicable to a large class of complex real-timesystems.
OVL (Open Verification Library) is designed to become a standard assertion language of the EDA (Electronic Design Automation) industry and has been adopted by many companies. With OVL, verification process can blended...
详细信息
ISBN:
(纸本)3540219749
OVL (Open Verification Library) is designed to become a standard assertion language of the EDA (Electronic Design Automation) industry and has been adopted by many companies. With OVL, verification process can blended seamlessly into the development cycles of complex systems. We investigate how to use OVL assertions for the verification of dense-time concurrent systems. We have designed a C-like language, called TC (timed C), for the description of real-time system with OVL assertions between code lines. We explain how to translate TC programs into optimized timed automata, how to translate OVL assertions into TCTL (timed Computation-Tree Logic) formulae, and how to analyze assertions when not satisfied. the idea is realized in our translator RG (RED Generator). In addition, we have developed several new verification techniques to take advantage of the information coming with OVL assertions for better verification performance. the new techniques have been incorporated in our high-performance TCTL model-checker RED 4.0. To demonstrate how our techniques can be used in industry projects, we report our experiments withthe L2CAP (Logical Link Control and Adaptation Layer Protocol) of Bluetooth specification.
Current hard real-time technologies are unable to support a new class of applicationsthat have real-time constraints but with dynamic request arrivals and unpredictable resource requirements. We propose two new admis...
详细信息
ISBN:
(纸本)3540219749
Current hard real-time technologies are unable to support a new class of applicationsthat have real-time constraints but with dynamic request arrivals and unpredictable resource requirements. We propose two new admission control approaches to address this problem. First, we present an efficient schedulability test;called utilization demand analysis, to handle periodic and aperiodic tasks with deterministic execution times. the utilization demand is defined as the processor utilization required for a mixed task set to meet deadlines with certainty, thus for deterministic deadline guarantees. We show that the utilization demand analysis eliminates the need for complicated schedulability analysis and enables on-line admission control. Second, we present a statistical admission control scheme using effective execution times to handle stochastic execution times. Effective execution times are determined from the deadline miss probability demanded by the application and stochastic properties of task execution tunes. Every task is associated with an effective execution time and is restricted to using processor time not exceeding its effective execution time. this scheme allows every task to meet its deadline with a specified probability without being interfered with, and greatly simplifies the admission control when combined withthe utilization demand analysis.
Current techniques for the verification of software as e.g. model checking are limited when it comes to the verification of complex distributed embeddedreal-timesystems. Our approach addresses this problem and in pa...
详细信息
暂无评论