Complex systems are large applications, typically running on distributed, heterogeneous networks, driven by a number of distinct constraints and desiderata on goals such as performance, real-time behavior, and fault t...
详细信息
In this paper we discuss issues in real-time image processing, including applications, approaches, and hardware. In particular, we discuss the failure of existing programming languages to support these considerations,...
详细信息
In this paper we discuss issues in real-time image processing, including applications, approaches, and hardware. In particular, we discuss the failure of existing programming languages to support these considerations, and present requirements for any language that can support real-time image processing.
A projection based approach for real-time detection of boundaries in an image having linear segments is described. The main processes involved in this approach are: image acquisition, edge detection, peak detection, a...
详细信息
A projection based approach for real-time detection of boundaries in an image having linear segments is described. The main processes involved in this approach are: image acquisition, edge detection, peak detection, and connectivity analysis. This technique uses parameterized representation of the straight line and is efficiently implemented in a systolic architecture.< >
To improve the performance of programs composed of abstract data types (ADTs), a parallel execution model is used to exploit concurrency at the method level. Typically, an ADT instance is used to manage more than one ...
详细信息
ISBN:
(纸本)0818664207
To improve the performance of programs composed of abstract data types (ADTs), a parallel execution model is used to exploit concurrency at the method level. Typically, an ADT instance is used to manage more than one variable, and there may be contention for getting access to the ADT instance if multiple variables need to be accessed concurrently. To resolve the contention, the ADT instance is cloned, and the copies are placed in different processors so that the multiple copies can be used concurrently. To exploit automatically the concurrency available via ADT instance cloning, we analyze program dependence relations. Not only control and data dependence but also instance dependence is analyzed to reveal dependence relations among method calls and to determine the clonability of each ADT instance. The focus of this paper is the use of our ADT cloning techniques to help ease the task of off-line scheduling in hard-real-time systems. Cloning and ARPCs are applied repeatedly to increase concurrency within processes missing deadlines, thus reducing their execution times.< >
Significant prior work exists on scheduling for the ’simple-tasks-single-processor’, ’simple-tasks-multiple-processor’, and ’complex-tasks-single-processor’, but few researchers have yet considered the ’complex...
详细信息
Significant prior work exists on scheduling for the ’simple-tasks-single-processor’, ’simple-tasks-multiple-processor’, and ’complex-tasks-single-processor’, but few researchers have yet considered the ’complex-tasks-multiple-processor’ model. We propose a new algorithm, Least Space-time First (LSTF), to deal with the general ’complex-task-multiple-processor’ model. We demonstrate that LSTF outperforms the Highest-Level-First, Earliest Deadline-First and Least-Laxity-First scheduling disciplines in the sense of minimizing maximum tardiness of a set of tasks. LSTF can gracefully incorporate some realistic overhead assumptions, including context switch and communication. The Unit Precedence Graph and Soft-Precedence Edges significantly facilitate implementation of LSTF.
This paper addresses the problem of replicating and allocating periodic task modules to processing nodes (PNs) in distributed real-time systems subject to task precedence and timing constraints. The probability that a...
详细信息
This paper addresses the problem of replicating and allocating periodic task modules to processing nodes (PNs) in distributed real-time systems subject to task precedence and timing constraints. The probability that all tasks can be completed before their deadlines-termed as the probability of no dynamic failure (P/sub ND/)-is used as the performance-related reliability measure. Modules which are critical in meeting task deadlines are then selected using the critical path analysis. To provide the timing correctness embedded in P/sub ND/, both original and replicated task modules are not only assigned to PNs, but also scheduled on each PN so as to meet the deadlines of all tasks. The module allocation scheme uses (1) the branch-and-bound method to implicitly enumerate all possible allocations while effectively pruning unnecessary search paths; and (2) the module scheduling scheme to schedule the modules assigned to each PN. Several numerical examples are presented to illustrate the proposed scheme.< >
In this paper we discuss synchronization techniques-and specifically their implementation at the hardware, operating system and high-level language levels-that can be used to achieve deadline satisfaction. In particul...
详细信息
In this paper we discuss synchronization techniques-and specifically their implementation at the hardware, operating system and high-level language levels-that can be used to achieve deadline satisfaction. In particular, it is shown that by endowing process control computers with fully parallel input and output mechanisms making use of exact time specifications, synchronization and deadline satisfaction can be achieved at the same time without any jitter. Continuous multimedia applications require accurate synchronization of the clocks in different processors. The available solutions have considerable accuracy or applicability. Local clock synchronization by radio transmitted time information turns out to be the only general purpose and high accuracy technique that is applicable with reasonable effort.< >
Synchronous messages are usually generated periodically and each of them is required to be transmitted before the generation of the next message. Due to the inherent deficiency in its Medium Access Control (MAC) proto...
详细信息
Synchronous messages are usually generated periodically and each of them is required to be transmitted before the generation of the next message. Due to the inherent deficiency in its Medium Access Control (MAC) protocol, an FDDI token ring can use at most one half of its ring bandwidth to transmit such synchronous traffic. This deficiency greatly reduces the FDDI's capability of supporting multimedia applications like real-time voice/video transmissions. In this paper, we show how a few simple modifications to the FDDI's MAC protocol can remove this deficiency and double a ring's ability of supporting synchronous traffic. The modified protocol, called FDDI-M, preserves all other good features of an FDDI network and can also achieve a higher throughput for asynchronous traffic than the standard FDDI and the FDDI-II, thus making it useful even for those networks without heavy synchronous traffic.
Complex systems are large applications, typically running on distributed, heterogeneous networks, driven by a number of distinct constraints and desiderata on goals such as performance, real-time behavior, and fault t...
详细信息
Complex systems are large applications, typically running on distributed, heterogeneous networks, driven by a number of distinct constraints and desiderata on goals such as performance, real-time behavior, and fault tolerance. These requirements frequently conflict, and satisfaction of these design objectives interacts strongly with assignment of system tasks to processors. The NSWC design framework DESTINATION provides an assignment module which can be used to optimize the system, as measured by the value of a weighted combination of objective cost functions. For even modest-sized systems and networks, assignment space is too large to search exhaustively. We have implemented algorithms which generate heuristically good assignments. However, compile-time evaluation of many interesting design factors, even those clearly related to assignment, is impossible without some estimate of the schedule. We therefore provide approaches for determining a reasonable “pseudo-schedule” for a given system, network, and assignment, and use this to simulate execution in evaluating cost functions.
暂无评论