Run-time monitoring has been applied in software-intensive systems to detect run-time constraint violations and trigger system recovery actions. Uncontrolled monitoring activities may, however, delay detection of a violation for an unbounded time and, worse, affect the original system\u27s schedulability. In this dissertation, we introduce the concept of predictable run-time monitoring, which demands a bound on detection latency while ensuring temporal non-interference by the monitoring process. We present off-line analysis techniques that can 1) predict the maximum detection latency and the maximum (event) queue length with fixed-priority scheduling on uniprocessor systems, and 2) control the processor resource for monitor tasks and target...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
University of Minnesota Ph.D. dissertation. June 2012. Major: Computer science. Advisor:Professor An...
International audienceEstimating safe upper bounds on task execution times is required in the design...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
In this paper, we describe a run-time environment for monitoring distributed real-time systems. In p...
International audienceMulticore parallelism involve inter-tasks interferences leading to execution t...
International audienceMulticore parallelism involve inter-tasks interferences leading to execution t...
Poster presented in 28th GI/ITG International Conference on Architecture of Computing Systems (ARCS ...
In this paper we present the state of our work on runtime monitoring for real-time systems: a way to...
Anytime algorithms give intelligent real-time systems the ability to trade deliberation time for qua...
Robust high throughput computing requires effective mon-itoring and enforcement of a variety of reso...
Embedded real-time systems often operate under strict timing and dependability constraints. To ensur...
Abstract—Robust high throughput computing requires ef-fective monitoring and enforcement of a variet...
Abstract—All runtime management decisions in computer and information systems require immediate dete...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
University of Minnesota Ph.D. dissertation. June 2012. Major: Computer science. Advisor:Professor An...
International audienceEstimating safe upper bounds on task execution times is required in the design...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
Run-time monitoring has been applied in software-intensive systems to detect run-time constraint vio...
In this paper, we describe a run-time environment for monitoring distributed real-time systems. In p...
International audienceMulticore parallelism involve inter-tasks interferences leading to execution t...
International audienceMulticore parallelism involve inter-tasks interferences leading to execution t...
Poster presented in 28th GI/ITG International Conference on Architecture of Computing Systems (ARCS ...
In this paper we present the state of our work on runtime monitoring for real-time systems: a way to...
Anytime algorithms give intelligent real-time systems the ability to trade deliberation time for qua...
Robust high throughput computing requires effective mon-itoring and enforcement of a variety of reso...
Embedded real-time systems often operate under strict timing and dependability constraints. To ensur...
Abstract—Robust high throughput computing requires ef-fective monitoring and enforcement of a variet...
Abstract—All runtime management decisions in computer and information systems require immediate dete...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
University of Minnesota Ph.D. dissertation. June 2012. Major: Computer science. Advisor:Professor An...
International audienceEstimating safe upper bounds on task execution times is required in the design...