Formal specifications and proofs of inheritance protocols for real-time scheduling
Software Engineering Journal
Real-time and systems programming for PCs: using the iRMX for Windows operating system
Real-time and systems programming for PCs: using the iRMX for Windows operating system
Object-oriented real-time concurrency
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Real-Time Systems and Software
Real-Time Systems and Software
Real-Time Systems
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms and Applications
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms and Applications
Priority Inheritance Protocols: An Approach to Real-Time Synchronization
IEEE Transactions on Computers
Proceedings of the 11th International Conference of Z Users on The Z Formal Specification Notation
ZUM '98 Proceedings of the 11th International Conference of Z Users on The Z Formal Specification Notation
Specification-based Testing of Concurrent Systems
FORTE X / PSTV XVII '97 Proceedings of the IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE X) and Protocol Specification, Testing and Verification (PSTV XVII)
Combining Statecharts and Z for the Design of Safety-Critical Control Systems
FME '96 Proceedings of the Third International Symposium of Formal Methods Europe on Industrial Benefit and Advances in Formal Methods
Conformance testing of priority inheritance protocols
RTCSA '00 Proceedings of the Seventh International Conference on Real-Time Systems and Applications
Formal analysis of the priority ceiling protocol
RTSS'10 Proceedings of the 21st IEEE conference on Real-time systems symposium
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Hi-index | 0.00 |
The priority inversion problem arises when prioritized processes concurrently attempt to enter critical sections. This phenomenon results in extremely pessimistic estimations of worst case response times for real-time processes. Various protocols against priority inversion have been proposed in the literature and are available at system call level of operating systems and run-time executives. They belong to two major families of protocols: the priority inheritance protocols (PIP) and to the priority ceiling protocols (PCP). These protocols have in common that they allow to derive more optimistic worst case response times. In contrast to the importance of this predictability aspect in the context of time-critical applications a lot of PIP- and PCP-implementations are not correct and permit the violation of time bounds. This article presents an effective and flexible tool set applied here for the validation of the implementations of protocols of the PCP-family. Besides the manual setup and instrumentation major parts of the black-box validation process are executed automatically.