L. Palopoli, Luca Abeni, T. Cucinotta, G. Lipari, Sanjoy Baruah
{"title":"Weighted feedback reclaiming for multimedia applications","authors":"L. Palopoli, Luca Abeni, T. Cucinotta, G. Lipari, Sanjoy Baruah","doi":"10.1109/ESTMED.2008.4697009","DOIUrl":null,"url":null,"abstract":"Resource reservations are a very popular choice to schedule multimedia tasks. However, the high variability of the resource requirements hinders a static choice of the scheduling parameters. In this paper we address this problem by a combination of two strategies: adaptive reservations and resource reclaiming. The first one operates ldquolocallyrdquo (using the information of a single task), the second one operates ldquogloballyrdquo distributing unused bandwidth between the tasks. In this paper, we show by analytical results and by extensive simulations that the two techniques can be safely and usefully combined.","PeriodicalId":165969,"journal":{"name":"2008 IEEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE/ACM/IFIP Workshop on Embedded Systems for Real-Time Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ESTMED.2008.4697009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
Resource reservations are a very popular choice to schedule multimedia tasks. However, the high variability of the resource requirements hinders a static choice of the scheduling parameters. In this paper we address this problem by a combination of two strategies: adaptive reservations and resource reclaiming. The first one operates ldquolocallyrdquo (using the information of a single task), the second one operates ldquogloballyrdquo distributing unused bandwidth between the tasks. In this paper, we show by analytical results and by extensive simulations that the two techniques can be safely and usefully combined.