Proceedings of the 6th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis 2008
DOI: 10.1145/1450135.1450177
|View full text |Cite
|
Sign up to set email alerts
|

Providing accurate event models for the analysis of heterogeneous multiprocessor systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 47 publications
(34 citation statements)
references
References 15 publications
0
34
0
Order By: Relevance
“…Similarly, a TX task models the execution time of the Ethernet stack and the time that is required to transmit an Ethernet frame. The processor of the gateway is assumed to schedule tasks in staticpriority preemptive (SPP) fashion (Schliecker et al 2008). The TX task has the highest priority and RX tasks have a priority proportional to their CAN identifier below the TX task.…”
Section: Cpa Gateway Modelmentioning
confidence: 99%
“…Similarly, a TX task models the execution time of the Ethernet stack and the time that is required to transmit an Ethernet frame. The processor of the gateway is assumed to schedule tasks in staticpriority preemptive (SPP) fashion (Schliecker et al 2008). The TX task has the highest priority and RX tasks have a priority proportional to their CAN identifier below the TX task.…”
Section: Cpa Gateway Modelmentioning
confidence: 99%
“…an upper bound on time required to process n activations of the task. This allows the computation of an output event model describing the minimum and maximum numbers of tasks completion in a specific interval as described in Henia et al (2005) and Schliecker et al (2008). The output event models are then forwarded as input event models of the dependent tasks, which are then analyzed again using the updated event models.…”
Section: Formal Timing Analysismentioning
confidence: 99%
“…The event model describing packet injection is derived from the packet injection pattern of the target, e.g. for a an injection with period P, jitter J and minimum distance d, we use (see Schliecker et al (2008)…”
Section: Model Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, it is assumed that memory accesses over the bus take a constant amount of time to process, since no bus conflicts can occur. For multiprocessor systems with a shared communication infrastructure, however, transfer times depend on the bus load and are therefore no longer constant, causing the traditional methods to produce incorrect results [4], [5]. The main obstacle when performing timing analysis on multiprocessor systems is that the scheduling of tasks assumes that their worst-case execution times are known.…”
Section: Introduction and Related Workmentioning
confidence: 99%