[1992] Proceedings of the 12th International Conference on Distributed Computing Systems
DOI: 10.1109/icdcs.1992.235007
|View full text |Cite
|
Sign up to set email alerts
|

Guaranteeing synchronous message deadlines with the timed token protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(40 citation statements)
references
References 38 publications
0
40
0
Order By: Relevance
“…For example, in [30], [31], we showed that all the bound results of static priority scheduling algorithms obtained in [2], [3], [4], [5], [6], [7], [8] can be unified into our framework and expressed by one parameterized formula. Similarly, in [32], [33], [34], we showed that all existing bound results of weighted round robin schedulers obtained in [9], [10], [11] can be derived using our proposed framework.…”
Section: Introductionmentioning
confidence: 64%
See 2 more Smart Citations
“…For example, in [30], [31], we showed that all the bound results of static priority scheduling algorithms obtained in [2], [3], [4], [5], [6], [7], [8] can be unified into our framework and expressed by one parameterized formula. Similarly, in [32], [33], [34], we showed that all existing bound results of weighted round robin schedulers obtained in [9], [10], [11] can be derived using our proposed framework.…”
Section: Introductionmentioning
confidence: 64%
“…The authors proved that this method yields more accurate test results than the utilization-based schedulability test made on the original task set, at a cost of higher computing complexity. Utilization bounds for the time token protocol (scheduler) in FDDI networks were derived in [9], [10], [11]. Utilization bounds for static priority schedulers in a network environment have been studied in [21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…where Ut gives the overall number of unused tokens during a busy period in master k: , min (14) As expected, this equation embodies a mutual dependence, since R k appears in both sides of the equation. In fact, all the previous analysis underlay this mutual dependence, since in order to evaluate R k , Ut must be found, and vice-versa.…”
Section: Note That Ns Y +∑ I=1ns Yt/t I Ymentioning
confidence: 62%
“…By considering the actual token utilisation (14) we improve the results obtained by (6). Nonetheless, a priority inversion with the length:…”
Section: Note That Ns Y +∑ I=1ns Yt/t I Ymentioning
confidence: 77%