In this paper we address the problem of dynamic memory management in real-time Java embeddedsystems. Our work aims at suppressing the need for garbage collection in order to avoid unpredictable pause times. For that ...
详细信息
ISBN:
(纸本)9780769529752
In this paper we address the problem of dynamic memory management in real-time Java embeddedsystems. Our work aims at suppressing the need for garbage collection in order to avoid unpredictable pause times. For that we use a simple static analysis algorithm coupled with region-based memory management as presented in [151] To overcome the well-known limitations of region inference, we propose in this paper to involve the developer in the analysis process by providing feedback on programming constructs likely to produce memory leaks. Experiments show that for most programming patterns, our system behaves as efficiently as a garbage collector in terms of memory consumption. Our analysis tool is furthermore able to provide useful feedback to the programmer to pinpoint problematic constructs.
In this paper we analyze the influence of the urgency in the timed transitions, and as consequence, in the test suite generation. As result, we formalize rules to generate sequences where the messages exchanged may be...
详细信息
ISBN:
(纸本)9780769529752
In this paper we analyze the influence of the urgency in the timed transitions, and as consequence, in the test suite generation. As result, we formalize rules to generate sequences where the messages exchanged may be instantaneous or delayed. In addition, the generated scenarios are able to detect timing faults. For test generation, we use a prototype tool called HJ2IF It is based on a test purpose algorithm, called Hit-or-Jump and it is applied for systems specified using Intermediate Format language (IF).
We consider a resource synthesis technique for real-timesystems where dynamic voltage scaling is supported, the energy budget is limited, and the performance of the system depends on how resources and energy are used...
详细信息
ISBN:
(纸本)9780769529752
We consider a resource synthesis technique for real-timesystems where dynamic voltage scaling is supported, the energy budget is limited, and the performance of the system depends on how resources and energy are used We propose a resource synthesis technique that derives boththe supply voltages and the resource allocation of the tasks in the system to maximize system performance. the resulting system satisfies real-time schedulability and energy requirements.
A component based hybrid embedded framework for mobile robot is presented in this paper. there are 3 layers in this framework, data layer, real-time layer, and high performance layer. the hardware consists of a hybrid...
详细信息
ISBN:
(纸本)9780769548791
A component based hybrid embedded framework for mobile robot is presented in this paper. there are 3 layers in this framework, data layer, real-time layer, and high performance layer. the hardware consists of a hybrid architecture of Advanced RISC Machine (ARM) architecture microcontroller and Field Programmable Gate Array (FPGA) with high-speed parallel/serial bus. the software mainly includes a static component system, a real-time operating system, embedded file system and TCP/IP stack etc.. A case study of a visual trajectory-tracking system for the presented framework is also described in this paper. the presented framework is not limited for mobile robot, but also suitable for other embeddedsystemsapplications.
the message scheduling is an essential mechanism in the context of Nerworked Control systems (NCS) which are systems based on communication networks and which allow, in particular the implementation of closed loop dis...
详细信息
ISBN:
(纸本)9780769529752
the message scheduling is an essential mechanism in the context of Nerworked Control systems (NCS) which are systems based on communication networks and which allow, in particular the implementation of closed loop distributed control applications. the scheduling of the messages of the flows of these closed loop distributed applications strongly influences the stability of these applications. the message scheduling is, in several networks, mainly based on fixed (static) priorities associated to the messages (for example the network CAN). In previous works, we have shown that the static priority scheme has intrinsic limitations and so, we propose in this paper in order to overcome these limitations, the concept of hybrid (hierarchical) priority. Different hybrid priority schemes are presented and evaluated with respect to the stability performances of the closed loop distributed process control applications. We show, in particular the advantage of a scheduling based on a scheme "hybrid priority + time strategy".
the paper presents a generative development methodology and component models of COAIDES-II, a component-based software framework for distributed embedded control systems withreal-time constraints. the adopted methodo...
详细信息
ISBN:
(纸本)9780769529752
the paper presents a generative development methodology and component models of COAIDES-II, a component-based software framework for distributed embedded control systems withreal-time constraints. the adopted methodology allows for rapid modeling and validation of control software at a higher level of abstraction, from which a system implementation in C can be automatically synthesized. To achieve this objective, COAMES-II defines formally various kinds of components to address the critical requirements Of the targeted domain, taking into consideration boththe architectural and behavioral aspects of the system. Accordingly, a system can be hierarchically composed from reusable components with heterogeneous models of computation, whereas behavioral aspects of interest are specified independently, following the principle of separation-of-concerns. the paper introduces the established generative methodology for COAMES-II from a general perspective, describes the component models in details and demonstrates their application through a DC-Motor control system case study.
this paper attempts to analyze the boot-up time of bootloader and Linux Kernel. and to compare performance of several root file-systems for fast boot-up time in the embedded Linux. therefore, it was implemented with t...
详细信息
ISBN:
(纸本)9780769529752
this paper attempts to analyze the boot-up time of bootloader and Linux Kernel. and to compare performance of several root file-systems for fast boot-up time in the embedded Linux. therefore, it was implemented withtime measurement module to analyze the boot-up time of bootloader and Linux kernel, and measured the time at each event point related to boot-up. As a result of analysis of six cases packaging, it has turned out the fact that the data checksum routine, decompressing the kernel and ramdisk image takes most of the boot-up time. Root file-system was packaged through analyzing such performance as boot-up time, memory usage, file system size. this is based on raw-kernel image and a combination of CRAMFS and JFFS2, and it has small size of the root file-system, the boot-up time is decreased.
A remarkable research activity has been carried out in the past few years to support real-timeapplications with appropriate scheduling solutions. Unfortunately, most of such techniques can be used only if real-time a...
详细信息
A remarkable research activity has been carried out in the past few years to support real-timeapplications with appropriate scheduling solutions. Unfortunately, most of such techniques can be used only if real-timeapplications use a specialized API, and if some important information (such as the worst-case execution-time) are known a priori. In this paper, we present a novel technique, the Legacy Feedback Scheduler (LFS), for a class of legacy applicationsthat need the support of a real-time scheduler but are not written using a specialized API and have unknown or varying execution requirements. the approach is based on the combination of a resource reservation scheduler and a feedback-based adaptation mechanism for identifying the correct scheduling parameters.
In a hostile military environment, systems must be able to detect and react to catastrophes in a timely manner in order to provide assurance that critical tasks will continue to meet their timeliness requirements. Our...
详细信息
ISBN:
(纸本)9780769529752
In a hostile military environment, systems must be able to detect and react to catastrophes in a timely manner in order to provide assurance that critical tasks will continue to meet their timeliness requirements. Our research focuses on achieving network quality of service (QoS) assurance using a Bandwidth Broker in the presence of network faults in layer-3 networks. Passive discovery techniques using the link-state information from routers provide for rapid path discovery which, in turn, leads to fast failure impact analysis and QoS restoration. In addition to network fault tolerance, the Bandwidth Broker must be fault tolerant and must be able to recover quickly. this is accomplished using a modified commercially available and open-source in-memory database cluster technology.
Code optimization of the offset assignment generated in embeddedsystems allows for power and space efficient systems. We propose a new heuristic that uses edge classification to commutatively transformation and optim...
详细信息
ISBN:
(纸本)9780769529752
Code optimization of the offset assignment generated in embeddedsystems allows for power and space efficient systems. We propose a new heuristic that uses edge classification to commutatively transformation and optimize the assignment. We introduce concept of breakable and unbreakable edges, which assists in selecting edges for path cover and edges for commutative transformation.
暂无评论