2016 11th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) 2016
DOI: 10.1109/recosoc.2016.7533903
|View full text |Cite
|
Sign up to set email alerts
|

SoCDep2: A framework for dependable task deployment on many-core systems under mixed-criticality constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…This part of the analysis is performed by the use of Routing Graphs [3]. A Routing Graph, RG(V, E), is a directed acyclic graph where V is the set of vertices that represent all network ports (input and output ports of the routers including the local ports) and E is the set of all edges which represent connections between the input and output ports.…”
Section: Analysis Of Attack Suspectsmentioning
confidence: 99%
See 2 more Smart Citations
“…This part of the analysis is performed by the use of Routing Graphs [3]. A Routing Graph, RG(V, E), is a directed acyclic graph where V is the set of vertices that represent all network ports (input and output ports of the routers including the local ports) and E is the set of all edges which represent connections between the input and output ports.…”
Section: Analysis Of Attack Suspectsmentioning
confidence: 99%
“…In this analysis the following routing algorithms have been considered: XY [24], YX [25], West-First [26], East-First [27], North-First [28], North-Last [26], Negative First [26], and South-First [28]. In this work, the SocDep 2 [3] framework has been used for modeling the routing graphs for the above mentioned turn models and for evaluating the presented Algorithms 1 and 2 for different scenarios. Compared to oblivious search (marked in orange in Figures 7-9), the use of router locations will reduce the search space in the worst case effort by 52%, 42%, and 21% for the previously illustrated sensitive paths 1, 2, and 3.…”
Section: Analysis Of Attack Suspectsmentioning
confidence: 99%
See 1 more Smart Citation
“…The mix of different criticalities originates from different requirements in safety [Int11;Rad11;Int10] for different applications running in the same system. Very often, a mixed-criticality application environment requires temporal and spatial isolation to guarantee freedom from interference [Hol+15;Aza+16]. Such isolation has traditionally been achieved by a federated architecture [DS10].…”
Section: Introduction and Related Workmentioning
confidence: 99%