Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2014 2014
DOI: 10.7873/date.2014.080
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…These analyses benefit from full knowledge of the internals of the memory controller, such as page policies, transaction scheduler and the DRAM command scheduler, and exploit this information to produce tight bounds. On the software side, servers with memory budgets, built into the operating system, have been proposed to limit the memory interference (Nowotsch et al 2014;Yun et al 2012;Behnam et al 2013;Yun et al 2013) from tasks executing on other cores, enabling it to be managed based on enforcement rather than characterization. Our work contrasts to these efforts in the sense that it considers both the software and hardware to be given with no interface or any other means to modify/re-configure it.…”
Section: Related Workmentioning
confidence: 99%
“…These analyses benefit from full knowledge of the internals of the memory controller, such as page policies, transaction scheduler and the DRAM command scheduler, and exploit this information to produce tight bounds. On the software side, servers with memory budgets, built into the operating system, have been proposed to limit the memory interference (Nowotsch et al 2014;Yun et al 2012;Behnam et al 2013;Yun et al 2013) from tasks executing on other cores, enabling it to be managed based on enforcement rather than characterization. Our work contrasts to these efforts in the sense that it considers both the software and hardware to be given with no interface or any other means to modify/re-configure it.…”
Section: Related Workmentioning
confidence: 99%
“…The work in [18] proposed an analysis method to compute an inflated WCET due to the contention for access to main memory by leaving the fine grained arbitration to the hardware. This approach requires the knowledge of resource demand for each task in a quantified value such as the number of accesses.…”
Section: Predictable Access To Main Memorymentioning
confidence: 99%
“…Nowotsch et al [29] propose a novel approach for integrating temporal partitioning and WCET analysis. Their proposed approach extends the existing single-core techniques with determining the maximum number of shared resource accesses per shared resource.…”
Section: B Resource Monitoringmentioning
confidence: 99%