“Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems”

From Navigators

(Difference between revisions)
Jump to: navigation, search
Line 17: Line 17:
bedded operating systems, via non-intrusive mechanisms.
bedded operating systems, via non-intrusive mechanisms.
|address=Lisbon, Portugal
|address=Lisbon, Portugal
-
|booktitle=Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014)
+
|booktitle=Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014) - Poster Session
|pages=2 pages
|pages=2 pages
}}
}}
-
(Presented at the Poster Session)
 

Revision as of 13:04, 29 May 2015

Ricardo Correia Pinto, José Rufino

in Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014) - Poster Session, Lisbon, Portugal, Nov. 2014, pp. 2 pages.

Abstract: Monitoring in embedded system software can have several uses, ranging from system characterization to run-time verification (RV). Traditional monitoring techniques require code instrumentation, imposing an overhead on system execution both in performance and timeliness. In real-time systems this is exarcebated by the need of new worst-case execution time estimation and schedulability analysis. In this paper we discuss how monitoring can be exploited in real-time em- bedded operating systems, via non-intrusive mechanisms.

Download paper

Download Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems

Export citation

BibTeX

Project(s): Project:READAPT

Research line(s): Timeliness and Adaptation in Dependable Systems (TADS)

Personal tools
Navigators toolbox