“Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems”

From Navigators

(Difference between revisions)
Jump to: navigation, search
Line 17: Line 17:
bedded operating systems, via non-intrusive mechanisms.
bedded operating systems, via non-intrusive mechanisms.
|address=Lisbon, Portugal
|address=Lisbon, Portugal
-
|booktitle=Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi 2014) - Poster Session
+
|booktitle=Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi) - Poster Session
|pages=1-2
|pages=1-2
}}
}}

Revision as of 01:34, 23 July 2015

Ricardo Correia Pinto, José Rufino

in Proceedings of the 4th Embedded Operating Systems Workshop (EWiLi) - Poster Session, Lisbon, Portugal, Nov. 2014, pp. 1–2.

Abstract: Monitoring in embedded system software can have several uses, ranging from system characterization to run-time verification (RV). Traditional monitoring techniques require code instrumentation, imposing an overhead on system execution both in performance and timeliness. In real-time systems this is exarcebated by the need of new worst-case execution time estimation and schedulability analysis. In this paper we discuss how monitoring can be exploited in real-time em- bedded operating systems, via non-intrusive mechanisms.

Download paper

Download Exploiting Non-intrusive Monitoring in Real-Time Embedded Operating Systems

Export citation

BibTeX

Project(s): Project:READAPT

Research line(s): Timeliness and Adaptation in Dependable Systems (TADS)

Personal tools
Navigators toolbox