We describe an end-to-end tool-chain for model-based design and analysis of component-based embedded real-time software. All aspects of an embedded real-time system are captured in domain-specific models, including so...
详细信息
We describe an end-to-end tool-chain for model-based design and analysis of component-based embedded real-time software. All aspects of an embedded real-time system are captured in domain-specific models, including software components and architecture, timing and resource constraints, processes and threads, execution platforms, etc. We focus on the AIRES tool, which performs various static analysis tasks based on the models, including system-level dependency analysis, execution rate assignment to component ports, real-time and schedulability analysis, and automated allocation of components to processors. By capturing all relevant information explicitly in the models at the design-level, and performing analysis that provide insight into nonfunctional aspects of the system, we can raise the level of abstraction for the designer, and facilitate rapid system prototyping.
Scheduling precedence-constrained tasks in a distributed real-time system is an NP-hard problem. As a result, the task allocation and scheduling algorithms that use these heuristics do not scale when applied to large ...
详细信息
Scheduling precedence-constrained tasks in a distributed real-time system is an NP-hard problem. As a result, the task allocation and scheduling algorithms that use these heuristics do not scale when applied to large distributed systems. In this paper we propose a novel approach that eliminates inter-task dependencies using shared buffers between dependent tasks. The system correctness, with respect to data-dependency, is ensured by having each dependent task poll the shared buffers at a fixed rate. Tasks can, therefore, be allocated and scheduled independently of their predecessors. To meet the timing constraints of the original dependent-task system, we have developed a method to iteratively derive the polling rates based on end-to-end deadline constraints. The overheads associated with the shared buffers and the polling mechanism are minimized by clustering tasks according to their communication and timing constraints. Our simulation results with the task allocation based on a simple first-fit bin packing algorithm showed that the proposed approach scales almost linearly with the system size, and clustering tasks greatly reduces the polling overhead.
Ultrahigh resolution OCT is used to visualize experimentally induced osteoarthritis in a rat knee model. Using a Cr4+:Forsterite laser, ultrahigh image resolutions of 5um are achieved in vivo. Progression of osteoarth...
详细信息
We demonstrate the ability of polarization spectroscopy and elastography, in conjunction with optical coherence tomography, to determine the properties of collagen organization in musculoskeletal tissue. Optical coher...
详细信息
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses forming streams can be targeted by optim...
详细信息
We demonstrate the ability of polarization spectroscopy and elastography, in conjunction with optical coherence tomography, to determine the properties of collagen organization in musculoskeletal tissue. Optical coher...
详细信息
We demonstrate the ability of polarization spectroscopy and elastography, in conjunction with optical coherence tomography, to determine the properties of collagen organization in musculoskeletal tissue. Optical coherence tomography images correlated with histologic analysis of collagen.
The Level 1 Muon Trigger subsystem for BTeV will be implemented using the same architectural building blocks as the BTeV Level 1 Pixel Trigger: pipelined field programmable gate arrays feeding a farm of dedicated proc...
详细信息
The Level 1 Muon Trigger subsystem for BTeV will be implemented using the same architectural building blocks as the BTeV Level 1 Pixel Trigger: pipelined field programmable gate arrays feeding a farm of dedicated processing elements. The muon trigger algorithm identifies candidate tracks, and is sensitive to the muon charge (sign);candidate dimuon events are identified by complementary charge track-pairs. To insure that the trigger is operating effectively, the trigger development team is actively collaborating in an independent multi-university research program for reliable, self-aware, fault adaptive behavior in real-time embedded systems (RTES). Key elements of the architecture, algorithm, performance, and engineered reliability are presented.
Early detection is critical in cancer control and prevention. Proteomics is an area in discovery of biomarkers that are molecular parameters associated with presence and severity of specific disease states. Protein sa...
详细信息
Early detection is critical in cancer control and prevention. Proteomics is an area in discovery of biomarkers that are molecular parameters associated with presence and severity of specific disease states. Protein samples are analyzed on the basis of mass to charge ratio (m/z) of particles they are composed of. Sequences of intensities (i.e. number of particles with specific value of m/z) can be interpreted using statistical approaches or information theory and data mining tools. The data mining, statistical, and information theoretical approaches have already been successfully applied to identify several types of cancer in gene or protein samples. However, due to small size of training sets and very large dimensionality of this kind of data new approaches that incorporate theoretical information need to be developed. This paper presents an application of Bayesian approach to detection of myeloma cancer sites in a sequence of ion intensity values obtained from protein samples. The use of scoring function developed by authors for calculation of data likelihood is also proposed.
Concurrency management is a basic requirement for interprocess communication in any multitasking system. This usually takes the form of lock-based or other blocking algorithms. In real-time and/or time-sensitive syste...
详细信息
暂无评论