Real-time behavior is materialized by timeliness specifications, which in essence call for synchronous system models. However, systems many often rely on large-scale, unpredictable and unreliable infrastructures, that suggest the use of asynchronous models. Several models in between have addressed these antagonistic aims, each in its own way. We propose an architectural construct that addresses the problem in a generic way. We assume the existence of a component that is capable of executing timely functions, however asynchronous the rest of the system may be. This component can be used by other components to execute timely services. There is a certain analogy to the trusted computing base principle used in security. We call it the Timely Co...
With the increased use of powerful, performance-optimized hardware components in embedded systems, t...
Providing contractual performance assurances in distributed systems is an important and challenging ...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Real-time behavior is materialized by timeliness specifications, which in essence call for synchrono...
In a recent report we proposed an architectural construct to address the problem of dealing with tim...
Distributed systems are widely used today, mostly supported by the Internet. In consequence, there i...
In open and heterogeneous environments, where an unpredictable number of applications compete for a ...
In a recent paper we introduced a new model to deal with the problem of handling application timelin...
This paper proposes a new architecture targeting real-time and reliable Distributed Computer-Contro...
Tolerating hardware faults in modern architectures is becoming a prominent problem due to the miniat...
Tasks in a real-time computing systems are com- monly periodic. Each job generated by the invocation...
A distributed system consists of a set of processors that communicate by message transmission and th...
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyrigh...
We address the problem of the impossibility of implementing synchronous fault-tolerant service speci...
Abstract—We investigate whether asynchronous computational models and asynchronous algorithms can be...
With the increased use of powerful, performance-optimized hardware components in embedded systems, t...
Providing contractual performance assurances in distributed systems is an important and challenging ...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Real-time behavior is materialized by timeliness specifications, which in essence call for synchrono...
In a recent report we proposed an architectural construct to address the problem of dealing with tim...
Distributed systems are widely used today, mostly supported by the Internet. In consequence, there i...
In open and heterogeneous environments, where an unpredictable number of applications compete for a ...
In a recent paper we introduced a new model to deal with the problem of handling application timelin...
This paper proposes a new architecture targeting real-time and reliable Distributed Computer-Contro...
Tolerating hardware faults in modern architectures is becoming a prominent problem due to the miniat...
Tasks in a real-time computing systems are com- monly periodic. Each job generated by the invocation...
A distributed system consists of a set of processors that communicate by message transmission and th...
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyrigh...
We address the problem of the impossibility of implementing synchronous fault-tolerant service speci...
Abstract—We investigate whether asynchronous computational models and asynchronous algorithms can be...
With the increased use of powerful, performance-optimized hardware components in embedded systems, t...
Providing contractual performance assurances in distributed systems is an important and challenging ...
We discuss a simplified version of the timing attack to illustrate a connection between security and...