Current real-time embedded systems evolve towards complex systems using new state of the art technologies such as multi-core processors and virtualization techniques. Both technologies requires new real-time schedulin...
详细信息
Current real-time embedded systems evolve towards complex systems using new state of the art technologies such as multi-core processors and virtualization techniques. Both technologies requires new real-time scheduling algorithms. For uniprocessor scheduling, utilization-based evaluation methodologies are common and well-established. For multicore systems and virtualization, evaluating and comparing scheduling techniques using the tasks' parameters is more realistic. Evaluating these different scheduling techniques requires relevant and standardised task sets. scheduling algorithms can be evaluated on three evaluation levels: 1) by using the mathematical model of the scheduling algorithm, 2) by simulating the scheduling algorithm and 3) by implementing the algorithm on the target platform. Generating task sets is straightforward in case of the first two levels;only the parameters of the tasks are required. Evaluating and comparing scheduling algorithms on the target platform itself, however, requires real executable tasks matching the predefined standardised task sets. Generating those executable tasks is not standardized yet. Therefore, we developed a task-set generator that generates reproducible, standardised task sets that are suitable at all levels. Beside generating the tasks' parameters, it includes an executable generator methodology that generates executables by combining publicly available benchmarks with know execution times. This paper presents and evaluates this task-set generator. The executables approximate the wanted execution time on the hardware platform.
This paper focuses on the improvement of the intelligent time management system which employ Bayesian optimization for suggesting time management plans for each particular person. In this sense, through historical dat...
详细信息
Broadcasting over parallel channels has been shown to be an effective method for disseminating public data to mobile devices. Using recent techniques, equipped devices can leverage energy-saving modes to reduce the am...
详细信息
With the gaining popularity of the Non-Volatile Memory (NVM) technology, NVM express (NVMe) is now becoming the de facto interface for high-end block devices. NVMe generally enables the applications to exploit the mas...
详细信息
As scheduling for real time polling services (rtPS) is not defined in IEEE 802.16 standard, there are various approaches described to address this issue. IEEE 802.16 has detailed documents about the QoS parameter. How...
详细信息
Real-time applications of future IT will continue to drive the demand for performance scaling in devices ranging from sensors to servers. Parallel processing in the form of mul-ticore and manycore architectures will a...
详细信息
This article presents a detailed discussion of LRE-TL (Local Remaining Execution-TL-plane), an algorithm that schedules hard real-time periodic and sporadic task sets with unconstrained deadlines on identical multipro...
详细信息
In this paper, we investigate the throughput maximizing problem for a classic three-node relay communication system with a receive-and-forward relay node, which is able to harvest energy from the nature using a rechar...
详细信息
In this paper, we investigate the throughput maximizing problem for a classic three-node relay communication system with a receive-and-forward relay node, which is able to harvest energy from the nature using a rechargeable battery. Besides of the energy consumption for reforwarding the received data, the energy for receiving data at the relay node is also considered. The objective is to maximize the relaying throughput, i.e., receive-and-forward data amount with the energy causality constraints. To this end, we optimize the constituent power allocation for receiving and transmitting under a deterministic energy harvesting (EH) model that the energy arrival time and the energy harvested amount are known prior to relaying. Finally, an algorithm to find the optimal power policy within the constraint of transmission deadline is presented.
Current research on scheduling of workflow applications in Cloud environment is main focused on the trade-off between the execution cost and time of a task. However, unlike traditional scheduling, there are other impo...
详细信息
Current research on scheduling of workflow applications in Cloud environment is main focused on the trade-off between the execution cost and time of a task. However, unlike traditional scheduling, there are other important requirements to be taken into account. One such a requirement is trust scheduling, namely selecting trustful compute resources and data hosts so that the execution of applications. In this paper, we formulate the scheduling problem for workflow applications with trust constraints and present a novel scheduling algorithms based on trust. Experimental results illustrate that the proposed heuristic scheduling algorithm is better than the traditional algorithm for scheduling application workflows, and can find the most trusted execution flow efficiently.
Recently, cloud platforms play an essential role in large-scale big data analytics and especially running scientific workflows. In contrast to traditional on-premise computing environments, where the number of resourc...
详细信息
ISBN:
(数字)9781728187891
ISBN:
(纸本)9781728187907
Recently, cloud platforms play an essential role in large-scale big data analytics and especially running scientific workflows. In contrast to traditional on-premise computing environments, where the number of resources is bounded, cloud computing can provide practically unlimited resources to a workflow application based on a pay-as-you-go pricing model. One challenge of using cloud computing is the protection of the privacy of the confidential workflow's tasks, whose proprietary algorithm implementations are intellectual properties of the respective stakeholders. Another one is the monetary cost optimization of executing workflows in the cloud while satisfying a user-defined deadline. In this paper, we use the Intel Software Guard eXtensions (SGX) as a Trusted Execution Environment (TEE) to support the confidentiality of individual workflow tasks. Based on this, we propose a deadline-constrained and SGX-aware workflow scheduling algorithm, called SEED (SGX, Efficient, Effective, Deadline Constrained), to address these two challenges. SEED features several heuristics, including exploiting the longest critical paths and reuse of extra times in existing virtual machine instances. Our experiments show that SEED outperforms the representative algorithm, IC-PCP, in most cases in monetary cost while satisfying the given user-defined deadline. To our best knowledge, this is the first workflow scheduling algorithm that considers protecting the confidentiality of workflow tasks in a public cloud computing environment.
暂无评论