Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple F
DOI: 10.1109/infcom.1990.91360
|View full text |Cite
|
Sign up to set email alerts
|

Guarantee protocols for communication in distributed hard real-time systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…For example, conservative estimation can be used with token passing protocols if the amount of time that a node can hold the token is bounded (Malcolm et al 1990). For example, conservative estimation can be used with token passing protocols if the amount of time that a node can hold the token is bounded (Malcolm et al 1990).…”
Section: The Conservative Estimation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, conservative estimation can be used with token passing protocols if the amount of time that a node can hold the token is bounded (Malcolm et al 1990). For example, conservative estimation can be used with token passing protocols if the amount of time that a node can hold the token is bounded (Malcolm et al 1990).…”
Section: The Conservative Estimation Methodsmentioning
confidence: 99%
“…The dynamic reservation method has been adopted for use with both a CSMA/CD window protocol (Malcolm et al 1990) and a token passing protocol (Malcolm et al 1990). When the network load is relatively low, both protocols perform better than TDMA or token passing protocols using the conservative estimation strategy.…”
Section: The Dynamic Reservation Methodsmentioning
confidence: 99%
“…Such a criticality-based classification is appropriate for mission critical system where tasks inherently are of different criticality [MZB90,HWC97,IT96]. In the absence of this classification, a less critical task would use the same amount of resources as a more critical one.…”
Section: Figure 2 Feasible Qos Regionmentioning
confidence: 99%