In this paper, a scheduling method for heterogeneous embedded systems is developed. At first, an internal representation model called FunState is presented which enables the explicit representation of non-determinism ...
详细信息
In this paper, a scheduling method for heterogeneous embedded systems is developed. At first, an internal representation model called FunState is presented which enables the explicit representation of non-determinism and scheduling using a combination of functions and state machines. The new scheduling method is able to deal with mixed data/control flow specifications and takes into account different mechanisms of non-determinism as occurring in the design of embedded systems. Constraints imposed by other already implemented components are respected. The scheduling approach avoids the explicit enumeration of execution paths by using symbolic techniques and guarantees to find a deadlock-free and bounded schedule if one exists. The generated schedule consists of statically scheduled basic blocks which are dynamically called at run time.
The dynamics of technological, economic and social phenomena is controlled by how humans organize their daily tasks in response to both endogenous and exogenous stimulations. Queueing theory is believed to provide a g...
详细信息
The dynamics of technological, economic and social phenomena is controlled by how humans organize their daily tasks in response to both endogenous and exogenous stimulations. Queueing theory is believed to provide a generic answer to account for the often observed power-law distributions of waiting times before a task is fulfilled. However, the general validity of the power law and the nature of other regimes remain unsettled. Using anonymized data collected by Google at the World Wide Web level, we identify the existence of several additional regimes characterizing the time required for a population of Internet users to execute a given task after receiving a message. Depending on the under- or over-utilization of time by the population of users and the strength of their response to perturbations, the pure power law is found to be coextensive with an exponential regime (tasks are performed without too much delay) and with a crossover to an asymptotic plateau (some tasks are never performed).
This volume of the Lecture Notes in computer Science series contains the set of papers accepted for publication at the colocated QofIS/ICQT 2002 workshops, i.e. the 3rd COST Action 263 International Workshop on Qualit...
详细信息
ISBN:
(数字)9783540458593
ISBN:
(纸本)9783540443568
This volume of the Lecture Notes in computer Science series contains the set of papers accepted for publication at the colocated QofIS/ICQT 2002 workshops, i.e. the 3rd COST Action 263 International Workshop on Quality of future Internet Services (QofIS) and the 2nd International Workshop on Internet Charging and QoS Technology (ICQT), both of which took place at the ETH Zric h, Switzerland, hosted by the computerengineering and Networking laboratory, tik. QofIS 2002 was the third in a series of highly successful technical workshops and meetings on Internet services within the framework of the COST Action 263 Q uality of future Internet Services , following previous events in Berlin, Germany in 2000 and in Coimbra, Portugal in 2001. ICQT 2002 was the follow-up to a vivid and extremely well-attended workshop on Internet economics and charging technology that took place within the framework of the Annual Meeting of the German Society for computer Science (GI) and the Austrian computer Society in 2001 in Vienna, Austria.
This application track paper describes the key technology advances achieved through a component-based design process, meeting right on track all key requirements of management systems for biometric data, such as data ...
详细信息
ISBN:
(纸本)1424407982
This application track paper describes the key technology advances achieved through a component-based design process, meeting right on track all key requirements of management systems for biometric data, such as data protection acts, flexible user and device handling, installation, and operation functions, and grouping functionality for users and devices according to dedicated office environmental needs.
暂无评论