Performance evaluation of analysis methods for arbitrating non-preemptive resource access in compositional real-time systems

M.M.H.P. Van Den Heuvel, R.J. Bril, J.J. Lukkien, T. Nolte

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

In this paper, we compare and survey different ways to model the scheduling delays corresponding to non-preemptive critical sections being executed by the tasks of different components that ultimately need to share one processor. We focus on the performance of compositional timing analyses for systems and we compare different protocols for the arbitration of tasks that wish to execute critical sections. Such analysis methods support timing predictable composition of independently validated components. This validation consists of analyzing the worst-case impact of critical sections on the schedules of the component's tasks. Finally, we evaluate the performance of the analysis methods by means of a simulation study.

Original languageEnglish
Title of host publication19th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2014, 16-19 September 2014, Barcelona, Spain
Place of PublicationPiscataway
PublisherInstitute of Electrical and Electronics Engineers
PagesWS5-1-10
Number of pages10
ISBN (Electronic)978-1-4799-4844-4
ISBN (Print)978-1-4799-4845-1
DOIs
Publication statusPublished - 8 Jan 2014
Event19th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2014) - Barcelona, Spain
Duration: 16 Sep 201419 Sep 2014
Conference number: 19

Conference

Conference19th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2014)
Abbreviated titleETFA 2014
CountrySpain
CityBarcelona
Period16/09/1419/09/14
Other2014 IEEE Emerging Technology and Factory Automation

Bibliographical note

Accepted papers are published in the ETFA 2014 conference

Fingerprint Dive into the research topics of 'Performance evaluation of analysis methods for arbitrating non-preemptive resource access in compositional real-time systems'. Together they form a unique fingerprint.

Cite this