Proceedings. Real-Time Systems Symposium
DOI: 10.1109/real.1988.51120
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting unused periodic time for aperiodic service using the extended priority exchange algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
1

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 80 publications
(30 citation statements)
references
References 3 publications
0
29
0
1
Order By: Relevance
“…Not all the bandwidth preserving algorithms can reclaim gain time at any high priority. The extended priority exchange algorithm [96], slack stealing algorithm [62] and dual-priority scheduling algorithm [36] are examples of those algorithms that can reclaim gain time at high priorities. A straightforward approach to identifying gain time is to compare a task's real execution time with its WCET when the task completes.…”
Section: Flexible Real-time Schedulingmentioning
confidence: 99%
“…Not all the bandwidth preserving algorithms can reclaim gain time at any high priority. The extended priority exchange algorithm [96], slack stealing algorithm [62] and dual-priority scheduling algorithm [36] are examples of those algorithms that can reclaim gain time at high priorities. A straightforward approach to identifying gain time is to compare a task's real execution time with its WCET when the task completes.…”
Section: Flexible Real-time Schedulingmentioning
confidence: 99%
“…When the server's period commences, the server runs if there is any outstanding non-periodic requests. If no requests exist, the priority exchange algorithm 43,69 allows the high priority server to exchange its priority with a lower priority periodic process. In this way, the server's priority decreases but time reserved for non-periodic processes is maintained.…”
Section: Priority Exchangementioning
confidence: 99%
“…The first algorithm using this concept to handle aperiodic tasks was known as the priority * exchange algorithm [8,23]. This algorithm was shown to have very good theoretical performance and to be fully compatible with the rate monotonic scheduling algorithm.…”
Section: Cmu/sei-91-tr-6mentioning
confidence: 99%