Real-Time Systems. Design Principles for Distributed Embedded Applications. Herman Kopetz. Second Edition (Real-Time Systems. Design Principles for Distributed Embedded Applications. Herman Kopetz. Second Edition.pdf), страница 102
Описание файла
PDF-файл из архива "Real-Time Systems. Design Principles for Distributed Embedded Applications. Herman Kopetz. Second Edition.pdf", который расположен в категории "". Всё это находится в предмете "(иус рв) архитектура управляющих систем реального времени" из 10 семестр (2 семестр магистратуры), которые можно найти в файловом архиве МГУ им. Ломоносова. Не смотря на прямую связь этого архива с МГУ им. Ломоносова, его также можно найти и в других разделах. .
Просмотр PDF-файла онлайн
Текст 102 страницы из PDF
(pp. 112-126).References363Kopetz, H., A. Ademai, & A. Hanzlik.(2004). Integration of Internal and ExternalClock Synchronization by the Combination of Clock State and Clock Rate Correctionin Fault Tolerant Distributed Systems. Proc. of the RTSS 2004. IEEE Press. (pp.415-425).[Kop06] Kopetz, H. (2006). Pulsed Data Streams. In: From Model-Driven Design to ResourceManagement for Distributed Embedded Systems. IFIP Series 225/2006.
SpringerVerlag. (pp. 105-114).[Kop07] Kopetz, H., et al. (2007). Periodic Finite-State Machines. Proc. of ISORC 2007. IEEEPress. (pp. 10-20).[Kop08] Kopetz, H. (2008). The Rationale for Time-triggered Ethernet. RTSS 2008. IEEEPress. (pp. 3-11).[Kop08a] Kopetz, H. (2008). The Complexity Challenge in Embedded System Design. Proc. ofISORC 2008. IEEE Press. (pp. 3-12).[Kop09] Kopetz, H. (2009). Temporal Uncertainties in Cyber-Physical Systems.
Institute f€urTechnische Informatik, TU Vienna, Report 1/2009. Vienna.[Kop10] Kopetz, H. (2010). Energy-Savings Mechanism in the Time-Triggered Architecture.Proc. of the 13th ISORC. IEEE Press. (pp. 28-33).[Kop85] Kopetz, H. & W. Merker. (1985). The Architecture of MARS. Proc. of FTCS-15. IEEEPress.
(pp. 274-279).[Kop87] Kopetz, H. & W. Ochsenreiter. (1987). Clock Synchronization in Distributed RealTime Systems. IEEE Trans. Computers. Vol. 36(8). (pp. 933-940).[Kop89] Kopetz, H. et al. (1989). Distributed Fault Tolerant Real-Time Systems: The MARSApproach. IEEE Micro. Vol. 9(1). (pp. 25-40).[Kop90] Kopetz, H. & K. Kim.
(1990). Temporal Uncertainties in Interactions amongReal-Time Objects. Proc. 9th IEEE Symp. on Reliable Distributed Systems. IEEEPress. (pp. 165-174).[Kop91] Kopetz, H., G. Gr€unsteidl, & J. Reisinger. (1991). Fault-Tolerant Membership Servicein a Synchronous Distributed Real-Time System. In: Dependable Computing forCritical Applications.
Springer-Verlag. (pp. 411-429).[Kop92] Kopetz, H. (1992). Sparse Time versus Dense Time in Distributed Real-Time Systems.Proc. 14th Int. Conf. on Distributed Computing Systems. IEEE Press. (pp. 460-467).[Kop93] Kopetz, H. & G. Gruensteidl. (1993). TTP - A Time-Triggered Protocol for FaultTolerant Real-Time Systems. Proc. FTCS-23. IEEE Press. (pp. 524-532)[Kop93a] Kopetz, H.
& J. Reisinger. (1993). The Non-Blocking Write Protocol NBW: A Solution toa Real-Time Synchronisation Problem. Proc. of RTSS 1993. IEEE Press. (pp. 131-137).[Kop95] Kopetz, H. (1995). The Time-Triggered Approach to Real-Time System Design. In:Predictably Dependable Computing Systems. Brian Randell, Editor. Springer Verlag.(pp. 53-66).[Kop98] Kopetz, H. (1998). The Time-triggered Model of Computation. Proc.
of RTSS 1998.IEEE Press. (pp. 168-176).[Kop99] Kopetz, H. (1999). Elementary versus Composite Interfaces in Distributed Real-TimeSystems. Proc. of ISADS 99. IEEE Press. (pp. 26-34).[Kor10] Kortuem, G., et al. (2010). Smart Objects as the Building Block for the Internet ofThings. IEEE Internet Computing, Jan 2010). (pp. 44-50).[Kum10] Kumar, K. & Y.H. Lu (2020). Cloud Computing for Mobile Users: Can OffloadingComputation Save Energy? IEEE Computer, April 2010.
(pp. 51-56).[Lal94]Lala, J.H. & R.E. Harper. (1994). Architectural Principles for Safety-Critical RealTime Applications. Proc. of the IEEE. Vol. 82(1). (pp. 25-40).[Lam74] Lamport, L. (1994). A New Solution of Dijkstra’s Concurrent Programming Problem.Comm. ACM. Vol. 8(7). (pp. 453-455).[Lam78] Lamport, L.(1978). Time, Clocks, and the Ordering of Events. Comm. ACM.
Vol. 21(7). (pp. 558-565).[Kop04]364[Lam82]ReferencesLamport, L., Shostak, R., Pease, M. (1982). The Byzantine Generals Problem. Comm.ACM TOPLAS. Vol. 4(3). (pp. 382-401).[Lam85] Lamport, L. & P.M. Melliar Smith. (1985). Synchronizing Clocks in the Presence ofFaults. Journal of the ACM. Vol. 32(1). (pp. 52-58).[Lan09] Langley, P., J.E. Laird, & S. Rogers. (2009). Cognitive Architectures: Research Issuesand Challenges.
Cognitive System Research. Vol. 10(2). (pp. 141-160).[Lan81] Landwehr, C.E. (1981). Formal Models for Computer Security. ACM ComputingSuverys. Vol. 13(3). (pp. 248-278).[Lan97] Landwehr, C.E. & D.M. Goldschlag. (1997). Security Issues in Networks with InternetAccess. Proc. of the IEEE. Vol. 85(12). (pp. 2034-2051).[Lau06] Lauwereins, R. (2006). Multi-core Platforms are a Reality. . .but where is the SoftwareSupport? Visual Presentation. IMEC. URL: http://www.mpsoc-forum.org/2006/slides/Lauwereins.pdf[Lee02] Lee, E.A. (2002).
Embedded Software. Advances in Computers. Vol. 56. AcademicPress[Lee10] Lee, E.A. & Seshia, S. A. (2010). Introduction to Embedded Systems – A CyberPhysical Systems Approach. http://LeeSeshia.org, 2010.[Lee90] Lee, P.A. & Anderson, T. (1990). Fault Tolerance: Principles and Practice. SpringerVerlag.[Leh85] Lehmann M.M. & Belady, L. (1985). Program Evolution: Processes of SoftwareChange. Academic Press.[Lev08] Leverich, J., et al. (2008).
Comparative Evaluation of Memory Models of ChipMultiprocessors. ACM Trans. on Architecture and Code Optimization, 2008. Vol. 5(3). (pp. 12.1-12.30).[Lev95] Leveson, N.G. (1995). Safeware: System Safety and Computers. Addison WesleyCompany. Reading, Mass.[Lie10]Lienert, D., Kriso, S. (2010). Assessing Criticality in Automotive Systems. IEEEComputer. Vol. 43(5). (p. 30).[Lit93]Littlewood, B. & L. Strigini, (1993). Validation of ultra-high dependability for software-based systems. Comm. ACM.
Vol. 36(11). (pp. 69-80).[Liu00]Liu, J.W.S. (2000). Real-Time Systems. Prentice Hall.[Liu73]Liu, C.L. & J.W. Layland. (1973). Scheduling Algorithms for Multiprogramming in aHard-Real-Time Environment. Journal of the ACM. Vol. 20(1). (pp. 46-61).[Lun84] Lundelius, L. & N. Lynch. (1984).
An Upper and Lower Bound for Clock Synchronization. Information and Control. Vol. 62. (pp. 199-204).[Lv09]Lv, M. et al. (2009). A Survey of WCET Analysis of Real-Time Operating Systems.URL: http://www.neu-rtes.org/publications/lv_ICESS09.pdf[Mai98] Maier, M.W. (1998). Architecting Principles for System of Systems.
Systems Engineering.Vol. 1(4). (pp. 267-284).[Mar10] Marwedel, P. (2010). Embedded System Design: Embedded Systems Foundations ofCyber-Physical Systems. Springer Verlag.[Mar91] MARS. (1991). The Mars Video. TU Vienna, URL: http://pan.vmars.tuwien.ac.at/mars/video[Mar99] Martin, T.L. & D.P. Siewiorek. (1999). The Impact of Battery Capacity and MemoryBandwidth on CPU Speed Setting: A Case Study. Proc. of ISLPED99. IEEE Press.(pp. 200-205).[McC09] McCabe, M.
et al. (2009). Avionics Architecture Interface Considerations betweenConstellation Vehicles. Proc. DASC’09. IEEE Press. (pp. 1.E.2.1-1.E.2,10).[Mes04] Mesarovic, M.D., S.N. Screenath, & J.D. Keene. (2004) Search for Organizing Principles: Understanding in Systems Biology. Systems Biology on line, Vol. 1(1). (pp.
19-27).[Mes89] Mesarovic, M.D. (1989). Abstract System Theory. Lecture Notes in Control andInformation Science. Vol. 116. Springer Verlag.References365Metclafe, R.M., Ethernet. (1976). Distributed Packet Switching for Local ComputerNetworks. Comm. of the ACM. (pp. 395-404).[Mil04] Miller, D. (2004). AFDX Determinism.
Visual Presentation at ARINC General Session,October 27, 2004. Rockwell Collins.[Mil56] Miller, G.A. (1956). The Magical Number Seven, Plus or Minus Two: Some Limitson Our Capacity for Processing Information. The Psychological Review. Vol. 63.(pp. 81-97).[Mil91] Mills, D.L. (1991). Internet Time Synchronization: The Network Time Protocol. IEEETrans. on Comm. Vol.
39(10). (pp. 1482-1493).[Mog06] Mogul, C. (2006). Emergent (Mis)behavior vs. Complex Software Systems. Proc. ofEuroSys 2006. ACM Press.[Mok93] Mok, A. (1993). Fundamental Design Problems of Distributed Systems for the HardReal-Time Environment. PhD Thesis. Massachusetts Institute of Technology.[Mor07] Morin, E. (2007). Restricted Complexity, General Complexity. World Scientific Publishing Corporation.[NAS99] NASA, (1999). Mars Climate Orbiter Mishap Investigation Report. Washington, DC.ftp://ftp.hq.nasa.gov/pub/pao/reports/2000/MCO_MIB_Report.pdf[Neu56] Neumann, J. (1956). Probabilistic Logic and the Synthesis of Reliable Organisms fromUnreliable Components.
In: Automata Studies, Annals of Mathematics Studies No. 34,C.E. Shannon & M. J, Editors. Princeton Univ. Press. (pp. 43-98).[Neu94] Neuman, B.C. & T. Ts’o. (1994). Kerberos–An Authentication Service for ComputerNetworks. IEEE Communication Magazine. Vol. 32(9). (pp. 33-38).[Neu95] Neumann, P.G.
(1995). Computer Related Risks. Addison Wesley—ACM Press.[Neu96] Neumann, P.G. (1996). Risks to the Public in Computers and Related Systems.Software Engineering Notes, Vol. 21(5). ACM Press. p. 18.[Obm09] Obermaisser, R. & H. Kopetz. (2009). GENSYS–An ARTEMIS Cross-Domain Reference Architecture for Embedded Systems. S€udwestdeutscher Verlag f€ur Hochschulschriften (SVH).[OMG08] OMG, MARTE. (2008).
Modeling and Analysis of Real-time and Embedded Systems,Object Management Group.[Pap02] Pappu, R., et al. (2002). Physical One-Way Functions. Science. Vol. 297. (pp. 20262030).[Par97]Parunak, H.v.D. et. al. [1997]. Managing Emergent Behavior in Distributed ControlSystems. Proc. of ISA Tech 97. (pp. 1-8).[Pau08] Paukovits, C. & H. Kopetz. (2008). Concepts of Switching in the Time-TriggeredNetwork-on-Chip.