{"title":"Real-time queueing network theory","authors":"J. Lehoczky","doi":"10.1109/REAL.1997.641269","DOIUrl":"https://doi.org/10.1109/REAL.1997.641269","url":null,"abstract":"This paper presents real-time queueing network theory, the extension of real-time queueing theory introduced by J.P. Lehoczky (1996) to Jackson queueing networks. This theory describes the behavior of standard Jackson queueing networks when the tasks have end-to-end deadlines. This theory is focused on describing the instantaneous multidimensional profiles of the lead-times of all the tasks in all the nodes of the network. The earliest end-to-end deadline first policy is used at all nodes in the network, although the theory permits other scheduling policies and different policies at different nodes. The real-time network problem is formulated in general, but it is analyzed under heavy traffic conditions where the traffic intensity at each node approaches 1. In this case, the multivariate queue length process converges to a Brownian network, a multivariate Brownian motion constrained to the first orthant. The conditional multivariate lead-time profiles at each of the nodes given the queue lengths converge to a deterministic profile. This characterization is borne out by simulation, and is used to design and evaluate queue control policies to reduce task lateness.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124028091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jitter concerns in periodic task systems","authors":"Sanjoy Baruah, Deji Chen, A. Mok","doi":"10.1109/REAL.1997.641270","DOIUrl":"https://doi.org/10.1109/REAL.1997.641270","url":null,"abstract":"A model for periodic tasks is proposed that explicitly incorporates jitter-the uncertainty in the arrival times of individual frames. Feasibility-analysis of systems of such tasks is studied in the context of dynamic-priority, preemptive, uniprocessor scheduling. From a computational complexity perspective, the problem is shown to be no more difficult than feasibility analysis in systems of periodic tasks that do not exhibit jitter. Several feasibility analysis algorithms are presented and proven correct.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"29 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cache-aware scheduling algorithm for embedded systems","authors":"G. Luculli, M. Natale","doi":"10.1109/REAL.1997.641282","DOIUrl":"https://doi.org/10.1109/REAL.1997.641282","url":null,"abstract":"The paper presents a methodology for scheduling real time tasks in embedded systems where the task layout is known at design time and does not change at execution time (static systems) and where the cache miss costs are significant when compared to the normal execution time of the tasks. The scheduling model assumes a time driven dispatching of the application tasks which are ordered in a pre defined sequence. Building such a sequence in a way that is not only efficient but accounts for optimal cache sequencing is the aim of our method. The refinement of the schedule towards an optimal solution is done by simulated annealing techniques. The evaluation of the schedules is done by considering the effects of instruction caching when evaluating the computation time of the tasks.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A better polynomial-time schedulability test for real-time fixed-priority scheduling algorithms","authors":"C. Han, Hung-Ying Tyan","doi":"10.1109/REAL.1997.641267","DOIUrl":"https://doi.org/10.1109/REAL.1997.641267","url":null,"abstract":"The problem of scheduling real-time periodic task has been studied extensively since its first introduction by C.L. Liu and J.W. Layland in their classic paper (1973). Due to several merits of the fixed-priority scheduling scheme, a lot of research work has focused on the analysis of fixed-priority scheduling algorithms. For the case that the deadlines of the executions of all the tasks coincide with the ends of their corresponding periods. Liu and Layland derived a worst-case utilization bound for a task set to be schedulable by the rate-monotonic (RM) algorithm. A. Burchard et al. (1995) presented another schedulability condition for RM, which has a higher utilization bound under a certain task condition. Although their closed-form utilization bounds provide a convenient way for testing the schedulability of a task set under the RM algorithm, the schedulability test using their bounds is too pessimistic since a lot of task sets with total utilizations larger than their bounds (and less than or equal to 1) are still schedulable by RM. In this paper, we propose a polynomial-time schedulability test and prove that it is better than Liu and Layland's and Burchard's utilization bounds in the sense that as long as the total utilization of a task set is less than or equal to their bounds, our schedulability test will always answer positively for the schedulability of the task set under RM and even if a feasible task set has a total utilization larger than their bounds, our schedulability test will still answer positively with a high probability. We also show how to generalize our polynomial-time schedulability test to handle general task sets scheduled by arbitrary fixed-priority scheduling algorithms.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Similarity-based load adjustment for real-time data-intensive applications","authors":"Shao-Juen Ho, Tei-Wei Kuo, A. Mok","doi":"10.1109/REAL.1997.641277","DOIUrl":"https://doi.org/10.1109/REAL.1997.641277","url":null,"abstract":"How to exploit application semantics to improve the performance of a real-time data-intensive application has been an active research topic in the past few years. Weaker correctness criteria and semantics-based concurrency control algorithms were proposed to provide more flexibility in reordering read and write events. Distinct from the past work, this paper exploits the tradeoff between data consistency and system workload. The definition of similarity is combined with the idea of transaction skipping to provide a theoretical foundation for reducing the workload of a transaction system. We also propose guidelines to adjust the execution frequencies of a static set of transactions and prove their correctness. The strengths of this work were verified by simulation experiments on an air traffic control example (Peng et al., 1997).","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static priority scheduling for ATM networks","authors":"Chengzhi Li, R. Bettati, Wei Zhao","doi":"10.1109/REAL.1997.641288","DOIUrl":"https://doi.org/10.1109/REAL.1997.641288","url":null,"abstract":"Static priority scheduling is popular for traffic scheduling in ATM switches because it is less costly than dynamic priority scheduling while being sensitive to the delay constraints of connections. We study delay computation and priority assignment problems in an ATM network with static priority scheduling. Given an ATM network with arbitrary topology, it is possible that the traffic on it may become unstable (i.e., packet delays become unbounded) due to the potential cyclic dependency of the traffic. An unstable network is definitely unacceptable for many delay sensitive applications. We start by formally deriving a simple condition under which the network is guaranteed to be stable. We then develop a numerical method to compute worst case end to end delays in an ATM network with arbitrary topology. Convergence of the method is formally proved and a closed form for the computing error is obtained. Despite its advantages, static priority scheduling remains sensitive to proper priority assignment. We describe two simple priority assignment methods, which we show to outperform other commonly used methods.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-the-fly symbolic model checking for real-time systems","authors":"A. Bouajjani, S. Tripakis, S. Yovine","doi":"10.1109/REAL.1997.641266","DOIUrl":"https://doi.org/10.1109/REAL.1997.641266","url":null,"abstract":"This paper presents an on-the-fly and symbolic algorithm for checking whether a timed automaton satisfies a formula of a timed temporal logic which is more expressive than TCTL. The algorithm is on-the-fly in the sense that the state-space is generated dynamically and only the minimal amount of information required by the verification procedure is stored in memory. The algorithm is symbolic in the sense that it manipulates sets of states, instead of states, which are represented as boolean combinations of linear inequalities of clocks. We show how a prototype implementation of our algorithm has improved the performances of the tool KRONOS for the verification of the FDDI protocol.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122477858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A resource allocation model for QoS management","authors":"R. Rajkumar, Chen Lee, J. Lehoczky, D. Siewiorek","doi":"10.1109/REAL.1997.641291","DOIUrl":"https://doi.org/10.1109/REAL.1997.641291","url":null,"abstract":"Quality of service (QoS) has been receiving wide attention in many research communities including networking, multimedia systems, real-time systems and distributed systems. In large distributed systems such as those used in defense systems, on-demand service and inter-networked systems, applications contending for system resources must satisfy timing, reliability and security constraints as well as application-specific quality requirements. Allocating sufficient resources to different applications in order to satisfy various requirements is a fundamental problem in these situations. A basic yet flexible model for performance-driven resource allocations can therefore be useful in making appropriate tradeoffs. We present an analytical model for QoS management in systems which must satisfy application needs along multiple dimensions such as timeliness, reliable delivery schemes, cryptographic security and data quality. We refer to this model as Q-RAM (QoS-based Resource Allocation Model). The model assumes a system with multiple concurrent applications, each of which can operate at different levels of quality based on the system resources available to it. The goal of the model is to be able to allocate resources to the various applications such that the overall system utility is maximized under the constraint that each application can meet its minimum needs. We identify resource profiles of applications which allow such decisions to be made efficiently and in real-time. We also identify application utility functions along different dimensions which are composable to form unique application requirement profiles. We use a video-conferencing system to illustrate the model.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting skips in periodic tasks for enhancing aperiodic responsiveness","authors":"M. Caccamo, G. Buttazzo","doi":"10.1109/REAL.1997.641294","DOIUrl":"https://doi.org/10.1109/REAL.1997.641294","url":null,"abstract":"In certain real-time applications, ranging from multimedia to telecommunication systems, timing constraints can be more flexible than scheduling theory usually permits. For example, in video reception, missing a deadline is acceptable, provided that most deadlines are met. We deal with the problem of scheduling hybrid sets of tasks, consisting of firm periodic tasks (i.e., tasks with deadlines which can occasionally skip one instance) and soft aperiodic requests, which have to be served as soon as possible to minimize their average response time. We propose and analyze an algorithm, based on a variant of earliest deadline first scheduling, which exploits skips to enhance the response time of aperiodic requests. Schedulability bounds are also derived to perform off-line analysis.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal smoothness results and approximation techniques for real-time VBR video traffic smoothing","authors":"Junbiao Zhang, J. Hui","doi":"10.1109/REAL.1997.641287","DOIUrl":"https://doi.org/10.1109/REAL.1997.641287","url":null,"abstract":"We study the problem of real time VBR video traffic smoothing. One fundamental difficulty in this problem is that at any time during transmission, the information of most future video frames is not available and thus it is unlikely that global optimization can be achieved in the smoothing process. In order to measure the effectiveness of real time video smoothing methods, we first propose a benchmark algorithm which achieves optimality on some of the smoothness parameters in the smoothing results. Based on this algorithm, we found that significant discrepancy exists between the results produced by some of the existing smoothing methods and the smoothness upper bounds. With this observation, we then focus on devising an algorithm which improves the smoothing results. Experimental results show that our algorithm makes noticeable improvements in some of the smoothness parameters compared to existing smoothing methods.","PeriodicalId":231201,"journal":{"name":"Proceedings Real-Time Systems Symposium","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}