Bounding carry-in interference to improve fixed-priority global multiprocessor scheduling analysis

  • Nan Guan
  • , Meiling Han
  • , Chuancai Gu
  • , Qingxu Deng
  • , Wang Yi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Scopus citations

Abstract

The analysis of global multiprocessor scheduling is more difficult than its uniprocessor counterpart. Due to the unknown critical instant, existing techniques use overapproximations of task interference for efficient yet pessimistic analysis. In this paper, we proposed a new technique to improve the precision of interference estimation. The key is to identify and resolve contradicting assumptions made in the analysis procedure. The resulting new analysis method improves the analysis precision at the price of a higher complexity. Then we introduce techniques to optimize the new method for better efficiency. Experiments with randomly generated task sets are conducted to evaluate both the precision and efficiency of the proposed new method.

Original languageEnglish
Title of host publicationProceedings - IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2015
EditorsLisa O'Conner
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages11-20
Number of pages10
ISBN (Electronic)9781467378550
DOIs
StatePublished - 2015
Externally publishedYes
EventIEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2015 - Hong Kong, China
Duration: 19 Aug 201521 Aug 2015

Publication series

NameProceedings - IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2015

Conference

ConferenceIEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2015
Country/TerritoryChina
CityHong Kong
Period19/08/1521/08/15

Fingerprint

Dive into the research topics of 'Bounding carry-in interference to improve fixed-priority global multiprocessor scheduling analysis'. Together they form a unique fingerprint.

Cite this