2016 28th Euromicro Conference on Real-Time Systems (ECRTS) 2016
DOI: 10.1109/ecrts.2016.29
|View full text |Cite
|
Sign up to set email alerts
|

Multiprocessor Real-Time Locking Protocols for Replicated Resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…That is, strictly speaking a KX algorithm blocks a task until it may use some replica, but it usually is also necessary to quickly resolve exactly which replica a task is supposed to use. To this end, Nemitz et al [157] introduced several algorithms for the k-exclusion replica assignment problem, with the proposed algorithms representing different tradeoffs w.r.t. optimality considerations and overheads in practice [157].…”
Section: Elliott and Anderson Considered Globally Scheduled Multiproc...mentioning
confidence: 99%
See 1 more Smart Citation
“…That is, strictly speaking a KX algorithm blocks a task until it may use some replica, but it usually is also necessary to quickly resolve exactly which replica a task is supposed to use. To this end, Nemitz et al [157] introduced several algorithms for the k-exclusion replica assignment problem, with the proposed algorithms representing different tradeoffs w.r.t. optimality considerations and overheads in practice [157].…”
Section: Elliott and Anderson Considered Globally Scheduled Multiproc...mentioning
confidence: 99%
“…To this end, Nemitz et al [157] introduced several algorithms for the k-exclusion replica assignment problem, with the proposed algorithms representing different tradeoffs w.r.t. optimality considerations and overheads in practice [157].…”
Section: Elliott and Anderson Considered Globally Scheduled Multiproc...mentioning
confidence: 99%
“…For instance, an analogous analysis approach for G-FIFO has been adopted in [38] and [12]. With the above results in place, it is finally possible to present the main theorem of this section.…”
Section: Theorem 4 (From [1])mentioning
confidence: 99%
“…To the best of our knowledge, no efficient and exact analysis for G-FIFO is available. Due to this fact, similarly to G-FP and G-EDF, some authors derived a sufficient analysis by leveraging a 1/m-based interference bound, e.g., as done in [38] and [12].…”
Section: Introductionmentioning
confidence: 99%