Proceedings of the 24th International Conference on Real-Time Networks and Systems 2016
DOI: 10.1145/2997465.2997472
|View full text |Cite
|
Sign up to set email alerts
|

Response Time Analysis of Synchronous Data Flow Programs on a Many-Core Processor

Abstract: In this paper we introduce a response time analysis technique for Synchronous Data Flow programs mapped to multiple parallel dependent tasks running on a compute cluster of the Kalray MPPA-256 many-core processor. The analysis we derive computes a set of response times and release dates that respect the constraints in the task dependency graph. We extend the Multicore Response Time Analysis (MRTA) framework by deriving a mathematical model of the multilevel bus arbitration policy used by the MPPA. Further, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(57 citation statements)
references
References 24 publications
0
57
0
Order By: Relevance
“…Examples include: (i) covering processor clusters and multi-level bus/network-on-chip (NoC) arbitration policies. Initial work in this area is reported in (Rihani et al 2016). (ii) covering processor scheduling policies where analysis of cache-related pre-emption delays already exists, such as fixed-priority scheduling with pre-emption thresholds (Bril et al 2014(Bril et al , 2017, and EDF (Lunniss et al 2013).…”
Section: Discussionmentioning
confidence: 99%
“…Examples include: (i) covering processor clusters and multi-level bus/network-on-chip (NoC) arbitration policies. Initial work in this area is reported in (Rihani et al 2016). (ii) covering processor scheduling policies where analysis of cache-related pre-emption delays already exists, such as fixed-priority scheduling with pre-emption thresholds (Bril et al 2014(Bril et al , 2017, and EDF (Lunniss et al 2013).…”
Section: Discussionmentioning
confidence: 99%
“…To tackle with over-approximated WCETs due to interferences, several approaches incorporate interference analysis and provide interference-sensitive WCETs, e.g. [19], [20], [4], [5], [6]. In general, these approaches result in improved timing guarantees, compared to over-approximated WCETs, as they provide a context-dependent upper-bound of the interferences for a particular schedule.…”
Section: Related Workmentioning
confidence: 99%
“…To improve the provided upper-bounds, some approaches take into account the length of task overlapping, e.g. [5], or the precise timing of the requests, e.g. [21], or even provide contention-free schedules, e.g.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The off-line computation with a constraint programming approach is also classic as for instance done in [38,23,5,11]. In [42], the authors propose an off-line mapping of Scade/lustre programs on the Kalray MPPA to improve the WCET. In the continuation of the former work, Graillat and al.…”
Section: Predictable Executionmentioning
confidence: 99%