2008 Euromicro Conference on Real-Time Systems 2008
DOI: 10.1109/ecrts.2008.29
|View full text |Cite
|
Sign up to set email alerts
|

Bounding Shared-Stack Usage in Systems with Offsets and Precedences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(22 citation statements)
references
References 15 publications
0
22
0
Order By: Relevance
“…The authors demonstrate that the algorithm in [13] for the assignment of the highest possible preemption thresholds after priorities are assigned to tasks is also optimal with respect to stack usage (again, with the assumption of a given priority assignment). When scheduling offsets are known, they can be exploited to further improve the analysis and the definition of the threshold levels, as discussed in [9] [4]. Also, [5] provides an analysis of the use of non-preemptive regions for the purpose of improving schedulability (considering scheduling overheads).…”
Section: State Of the Artmentioning
confidence: 98%
See 1 more Smart Citation
“…The authors demonstrate that the algorithm in [13] for the assignment of the highest possible preemption thresholds after priorities are assigned to tasks is also optimal with respect to stack usage (again, with the assumption of a given priority assignment). When scheduling offsets are known, they can be exploited to further improve the analysis and the definition of the threshold levels, as discussed in [9] [4]. Also, [5] provides an analysis of the use of non-preemptive regions for the purpose of improving schedulability (considering scheduling overheads).…”
Section: State Of the Artmentioning
confidence: 98%
“…In [15], the blocking time limit is computed using Equation (4), which operates at the task level with the conservative assumption that the task is fully preemptive. In this case, the order of the runnables inside a task is irrelevant.…”
Section: Optimal Preemption Threshold and Execution Order Assignmentsmentioning
confidence: 99%
“…Hänninen et al [19] presented an approximate stack analysis method to derive a safe upper bound on the shared stack usage, in offset-based hybrid (interrupt-and time-driven) fixed priority preemptive systems. Finally, Bohlin et al [12] introduced some techniques to exploit precedence and offset relations between tasks, thus limiting preemption patterns and bounding the amount of shared-stack usage.…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, now blocking may occur for two reasons: i) the real local resources and ii) the pseudo-resources. In the first case, Equation (12) still holds and the feasibility can be verified using the methods introduced in [7]. In the second case, the blocking can be calculated in a similar way, and the ceiling for each pseudo-resource is computed in such a way that the system feasibility is always guaranteed.…”
Section: Integrating With Stack Resource Policy (Srp)mentioning
confidence: 99%
“…The authors demonstrate that the algorithm in [15] for the assignment of the maximum preemption thresholds is also optimal with respect to stack usage. When scheduling offsets are known, they can be exploited to further improve the analysis and the definition of the threshold levels, as discussed in [12] [5].…”
Section: Introductionmentioning
confidence: 99%