Handbook of Real-Time Computing 2019
DOI: 10.1007/978-981-4585-87-3_10-1
|View full text |Cite
|
Sign up to set email alerts
|

Multiprocessor Real-Time Locking Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 136 publications
0
6
0
Order By: Relevance
“…Very similar to our proposed approach are the seminal multicore versions of the priority-ceiling protocol by Rajkumar et al, which exist in a shared-memory [10] and a messagepassing [11] version, also referred to as MPCP and DPCP, respectively [7]. MPCP tries to benefit from data locality by distinguishing between local resources only used on one core and global resources.…”
Section: Background and Related Workmentioning
confidence: 88%
See 2 more Smart Citations
“…Very similar to our proposed approach are the seminal multicore versions of the priority-ceiling protocol by Rajkumar et al, which exist in a shared-memory [10] and a messagepassing [11] version, also referred to as MPCP and DPCP, respectively [7]. MPCP tries to benefit from data locality by distinguishing between local resources only used on one core and global resources.…”
Section: Background and Related Workmentioning
confidence: 88%
“…Synchronizing concurring threads through means of shared memory or message passing is a long researched topic [6]. As the interaction of threads over shared resources greatly influences their timing behavior, synchronization mechanisms are also a highly researched topic in the real-time community (an overview can be found in [7]). In particular, shared resources can lead to priority inversion, meaning ready-to-run higher priority threads cannot execute because of blocked resources held by lower priority threads [8].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Priority-and-budget inheritance protocols have been studied for a long time, mainly in the context of accessing lockprotected shared resources [35]. The seminal work on priority inheritance is due to Sha et al [36] in 1990.…”
Section: Related Workmentioning
confidence: 99%
“…Typically, tasks in a real-time robotic application are dependent on each other, where the dependency stems from their need to perform computations and exchange data, and thus access the MEC’s resources concurrently. The way the exclusive access to resources is handled, i.e., the real-time locking protocol ( Brandenburg, 2020 ) (the algorithm used to lock and unlock the MEC’s resources 3 when accessed concurrently by real-time tasks), has a direct effect on schedulability and therefore real-time performance (more in Section 2 through Section 10 ). Mainstream robotic frameworks lack predictable (bounded blocking) and efficient (low-overhead) locking protocols ( Section 2 , Section 10 ).…”
Section: Introductionmentioning
confidence: 99%