“Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems”
From Navigators
(Difference between revisions)
Line 4: | Line 4: | ||
|title=Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems | |title=Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems | ||
|author=Ricardo Correia Pinto, José Rufino, | |author=Ricardo Correia Pinto, José Rufino, | ||
- | |Project=Project:READAPT, Project:COST Action IC1402, | + | |Project=Project:READAPT, Project:COST Action IC1402, |
|ResearchLine=Timeliness and Adaptation in Dependable Systems (TADS) | |ResearchLine=Timeliness and Adaptation in Dependable Systems (TADS) | ||
|month=nov | |month=nov |
Latest revision as of 08:26, 5 April 2017
Ricardo Correia Pinto, José Rufino
in Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi) - Poster Session, Lisbon, Portugal, Nov. 2014, pp. 1–2.
Abstract: Monitoring in embedded system software can have several uses, ranging from system characterization to run-time verification (RV). Traditional monitoring techniques require code instrumentation, imposing an overhead on system execution both in performance and timeliness. In real-time systems this is exarcebated by the need of new worst-case execution time estimation and schedulability analysis. In this paper we discuss how monitoring can be exploited in real-time em- bedded operating systems, via non-intrusive mechanisms.
Download paper
Download Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems
Export citation
Project(s): Project:READAPT, Project:COST Action IC1402
Research line(s): Timeliness and Adaptation in Dependable Systems (TADS)