feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Association for Computing Machinery (ACM)  (15)
  • 1
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2006
    In:  ACM SIGOPS Operating Systems Review Vol. 40, No. 4 ( 2006-10), p. 191-204
    In: ACM SIGOPS Operating Systems Review, Association for Computing Machinery (ACM), Vol. 40, No. 4 ( 2006-10), p. 191-204
    Kurzfassung: Nearly ten years after its first presentation and five years after its first application to operating systems, the suitability of Aspect-Oriented Programming (AOP) for the development of operating system kernels is still highly in dispute. While the AOP advocacy emphasizes the benefits of AOP towards better configurability and maintainability of system software, most kernel developers express a sound skepticism regarding the thereby induced runtime and memory costs: Operating system kernels have to be lean and efficient.We have analyzed the runtime and memory costs of aspects in general, on the level of μ-benchmarks, and by refactoring and extending the eCos operating system kernel using AspectC++, an AOP extension to the C++ language. Our results show that most AOP features do not induce a intrinsic overhead and that the actual overhead induced by AspectC++ is very low. We have also analyzed a test case with significant aspect-related costs. This example shows how the structure of the underlying kernel can have a negative impact on aspect implementations and how these costs can be avoided by an aspect-aware design.Based on this analysis, our conclusion is that AOP is suitable for the development of operating system kernels and other kinds of highly efficient infrastructure software.
    Materialart: Online-Ressource
    ISSN: 0163-5980
    RVK:
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2006
    ZDB Id: 2082220-0
    ZDB Id: 243805-7
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2012
    In:  ACM SIGOPS Operating Systems Review Vol. 45, No. 3 ( 2012-01-11), p. 1-4
    In: ACM SIGOPS Operating Systems Review, Association for Computing Machinery (ACM), Vol. 45, No. 3 ( 2012-01-11), p. 1-4
    Kurzfassung: This report summarizes the Sixth Workshop on Programming Languages and Operating Systems (PLOS 2011), which was held in conjunction with the SOSP 2011 conference. It presents the motivation for the PLOS workshop series and describes the contributions of the PLOS 2011 event.
    Materialart: Online-Ressource
    ISSN: 0163-5980
    RVK:
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2012
    ZDB Id: 2082220-0
    ZDB Id: 243805-7
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2019
    In:  ACM SIGBED Review Vol. 16, No. 1 ( 2019-02-20), p. 33-38
    In: ACM SIGBED Review, Association for Computing Machinery (ACM), Vol. 16, No. 1 ( 2019-02-20), p. 33-38
    Kurzfassung: The continuously increasing degree of automation in many areas (e.g. manufacturing engineering, public infrastructure) lead to the construction of cyber-physical systems and cyber-physical networks. To both, time and energy are the most critical operating resources. Considering for instance the Tactile Internet specification, end-to-end latencies in these systems must be below 1ms, which means that both communication and system latencies are in the same order of magnitude and must be predictably low. As control loops are commonly handled over different variants of network infrastructure (e.g. mobile and fibre links) particular attention must be payed to the design of reliable, yet fast and energy-efficient data-transmission channels that are robust towards unexpected transmission failures. As design goals are often conflicting (e.g. high performance vs. low energy), it is necessary to analyze and investigate trade-offs with regards to design decisions during the construction of cyber-physical networks. In this paper, we present Δelta, an approach towards a tool-supported construction process for cyber-physical networks. Δelta extends the previously presented X-L AP tool by new analysis features, but keeps the original measurements facilities unchanged. Δelta jointly analyzes and correlates the runtime behavior (i.e. performance, latency) and energy demand of individual system components. It provides an automated analysis with precise thread-local time interpolation, control-flow extraction, and examination of latency criticality. We further demonstrate the applicability of Δelta with an evaluation of a prototypical implementation.
    Materialart: Online-Ressource
    ISSN: 1551-3688
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2019
    ZDB Id: 2239027-3
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2020
    In:  ACM SIGBED Review Vol. 17, No. 1 ( 2020-07-27), p. 24-29
    In: ACM SIGBED Review, Association for Computing Machinery (ACM), Vol. 17, No. 1 ( 2020-07-27), p. 24-29
    Kurzfassung: As system complexity grows, embedded operating systems increasingly face the challenge to adhere to various non-functional constraints, such as response times and power limits. These requirements sometimes contradict and, often, no solution satisfies all constraints under all conditions. Changes in environmental conditions, application-level requirements, and user response time expectation hence demand for system-wide adaptions to resource management. We find that process synchronization constitutes a simple yet effective leverage point to balance between timing-related and energy-related constraints. This paper presents Earl, an implementation of reconfigurable locks in Linux that enables seamless transitions between high-performance and low-power operating modes.
    Materialart: Online-Ressource
    ISSN: 1551-3688
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2020
    ZDB Id: 2239027-3
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2011
    In:  ACM SIGPLAN Notices Vol. 46, No. 2 ( 2011-01-26), p. 33-42
    In: ACM SIGPLAN Notices, Association for Computing Machinery (ACM), Vol. 46, No. 2 ( 2011-01-26), p. 33-42
    Kurzfassung: The C Preprocessor (CPP) is the tool of choice for the implementation of variability in many large-scale configurable software projects. Linux, probably the most-configurable piece of software ever, employs more than 10,000 preprocessor variables for this purpose. However, this de-facto variability tends to be "hidden in the code"; which on the long term leads to variability defects, such as dead code or inconsistencies with respect to the intended (modeled) variability of the software. This calls for tool support for the efficient extraction of (and reasoning over) CPP-based variability. We suggest a novel approach to extract CPP-based variability. Our tool transforms CPP-based variability in O(n) complexity into a propositional formula that "mimics" all valid effects of conditional compilation and can be analyzed with standard SAT or BDD packages. Our evaluation results demonstrate the scalability and practicability of the approach. A dead-block-analysis on the complete Linux source tree takes less than 30 minutes; we thereby have revealed 60 dead blocks, 2 of which meanwhile have been confirmed as new (and long-lasting) bugs; the rest is still under investigation.
    Materialart: Online-Ressource
    ISSN: 0362-1340 , 1558-1160
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2011
    ZDB Id: 2079194-X
    ZDB Id: 282422-X
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2013
    In:  ACM SIGPLAN Notices Vol. 48, No. 5 ( 2013-05-23), p. 21-32
    In: ACM SIGPLAN Notices, Association for Computing Machinery (ACM), Vol. 48, No. 5 ( 2013-05-23), p. 21-32
    Kurzfassung: The reduction of structure sizes in microcontollers, environmental conditions or low supply voltages increase the susceptibility of embedded systems to soft errors. As a result, the employment of fault-detection and fault-tolerance measures is becoming a mandatory task even for moderately critical applications. Accordingly, software-based techniques have recently gained in popularity, and a multitude of approaches that differ in the number and frequency of tolerated errors as well as their associated overhead have been proposed. Using type-safe programming languages to isolate critical software components is very popular among those techniques. An automated application of fault-detection and fault-tolerance measures based on the type system of the programming language and static code analyses is possible. It facilitates an easy evaluation of the protection characteristics and costs, as well as the migration of software to new hardware platforms with different failure rates. Transient faults, however, are not bound to the application code secured by the type system, but can also affect the correctness of the type system itself. Thereby, the type system might lose its ability to isolate critical components. As a consequence, it is essential to also protect the type system itself against soft errors. In this paper, we show how soft errors can affect the integrity of the type system. Furthermore, we provide means to secure it against these faults, thus preserving its isolating character. These measures can be applied selectively to achieve a suitable tradeoff between level of protection and resource consumption.
    Materialart: Online-Ressource
    ISSN: 0362-1340 , 1558-1160
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2013
    ZDB Id: 2079194-X
    ZDB Id: 282422-X
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2022
    In:  ACM Transactions on Embedded Computing Systems Vol. 21, No. 5 ( 2022-09-30), p. 1-24
    In: ACM Transactions on Embedded Computing Systems, Association for Computing Machinery (ACM), Vol. 21, No. 5 ( 2022-09-30), p. 1-24
    Kurzfassung: Machine learning has shown tremendous success in a large variety of applications. The evolution of machine-learning applications from cloud-based systems to mobile and embedded devices has shifted the focus from only quality-related aspects towards the resource demand of machine learning. For embedded systems, dedicated accelerator hardware promises the energy-efficient execution of neural network inferences. Their precise resource demand in terms of execution time and power demand, however, is undocumented. Developers, therefore, face the challenge to fine-tune their neural networks such that their resource demand matches the available budgets. This article presents Precious , a comprehensive approach to estimate the resource demand of an embedded neural network accelerator. We generate randomised neural networks, analyse them statically, execute them on an embedded accelerator while measuring their actual power draw and execution time, and train estimators that map the statically analysed neural network properties to the measured resource demand. In addition, this article provides an in-depth analysis of the neural networks’ resource demands and the responsible network properties. We demonstrate that the estimation error of Precious can be below 1.5% for both power draw and execution time. Furthermore, we discuss what estimator accuracy is practically achievable and how much effort is required to achieve sufficient accuracy.
    Materialart: Online-Ressource
    ISSN: 1539-9087 , 1558-3465
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2022
    ZDB Id: 2096332-4
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2018
    In:  ACM Transactions on Embedded Computing Systems Vol. 17, No. 1 ( 2018-01-31), p. 1-25
    In: ACM Transactions on Embedded Computing Systems, Association for Computing Machinery (ACM), Vol. 17, No. 1 ( 2018-01-31), p. 1-25
    Kurzfassung: Energy-neutral real-time systems harvest the entire energy they use from their environment. In such systems, energy must be treated as an equally important resource as time, which creates the need to solve a number of problems that so far have not been addressed by traditional real-time systems. In particular, this includes the scheduling of tasks with both time and energy constraints, the monitoring of energy budgets, as well as the survival of blackout periods during which not enough energy is available to keep the system fully operational. In this article, we address these issues presenting E n OS, an operating-system kernel for energy-neutral real-time systems. E n OS considers mixed time criticality levels for different energy criticality modes, which enables a decoupling of time and energy constraints when one is considered less critical than the other. When switching the energy criticality mode, the system also changes the set of executed tasks and is therefore able to dynamically adapt its energy consumption depending on external conditions. By keeping track of the energy budget available, E n OS ensures that in case of a blackout the system state is safely stored to persistent memory, allowing operations to resume at a later point when enough energy is harvested again.
    Materialart: Online-Ressource
    ISSN: 1539-9087 , 1558-3465
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2018
    ZDB Id: 2096332-4
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2017
    In:  ACM Transactions on Embedded Computing Systems Vol. 16, No. 5s ( 2017-10-31), p. 1-19
    In: ACM Transactions on Embedded Computing Systems, Association for Computing Machinery (ACM), Vol. 16, No. 5s ( 2017-10-31), p. 1-19
    Kurzfassung: Soft errors are a challenging and urging problem in the domain of safety-critical embedded systems. For decades, checking schemes have been investigated and improved to mitigate soft-error effects for the class of control-flow faults, with current industrial standards strongly recommending their use. However, reality looks different: Taking a systems perspective, we implemented four representative Control-Flow Checking (CFC) schemes and put them through their paces in 396 fault-injection campaigns. In contrast to previous work, which typically relied on probability-based vulnerability metrics, we accounted for the influence of memory and time overheads on the fault-space dimensions and applied those in full-scan fault injections. This change in procedure alone severely degraded the perceived effectiveness of CFC. In addition, we expanded the perspective to data-flow faults and their influence on the overall susceptibility, an aspect that so far has been largely ignored. Our results suggest that, without accompanying measures, any improvement regarding control-flow faults is dominated by the increase in data faults caused by the increased attack surface in terms of memory and runtime overhead. Moreover, CFC performance less depended on the detection capabilities than on general aspects of the concrete binary compilation and execution. In conclusion, incorporating CFC is not as straightforward as often assumed and the vulnerability of systems with hardened control-flow may in many cases even be increased by the schemes themselves.
    Materialart: Online-Ressource
    ISSN: 1539-9087 , 1558-3465
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2017
    ZDB Id: 2096332-4
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Association for Computing Machinery (ACM) ; 2008
    In:  ACM SIGOPS Operating Systems Review Vol. 42, No. 4 ( 2008-04-25)
    In: ACM SIGOPS Operating Systems Review, Association for Computing Machinery (ACM), Vol. 42, No. 4 ( 2008-04-25)
    Materialart: Online-Ressource
    ISSN: 0163-5980
    RVK:
    Sprache: Englisch
    Verlag: Association for Computing Machinery (ACM)
    Publikationsdatum: 2008
    ZDB Id: 2082220-0
    ZDB Id: 243805-7
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz