The paper presents dynamic load control constructs that provide Ada with overload detection and load reconfiguration mechanisms. This approach to dynamic resource control allows adaptation of application parameters based on the current load conditions. This capability allows for more complex resource control policies that utilize information about the actual application being performed. A set of explicit load control constructs is presented as language run time components. The overload detection function is placed in the application run time environment to support the distribution of the load detection mechanism. Using established resource control policies to determine processing control criteria, overloaded resources are managed effectively within the Ada run time environment. A strategy for employing the Ada language primitives and an associated runtime system for dynamic adaptation of embedded battle management applications is presented. The primitives and runtime system have been implemented and have been tested with several parallel battle management applications. An evaluation is presented to assess the implication of the load control experiment findings.<>
{"title":"Ada dynamic load control mechanisms for distributed embedded battle management systems","authors":"J. Macdonald, J. Johannes, K. Schwan","doi":"10.1109/RTA.1993.263096","DOIUrl":"https://doi.org/10.1109/RTA.1993.263096","url":null,"abstract":"The paper presents dynamic load control constructs that provide Ada with overload detection and load reconfiguration mechanisms. This approach to dynamic resource control allows adaptation of application parameters based on the current load conditions. This capability allows for more complex resource control policies that utilize information about the actual application being performed. A set of explicit load control constructs is presented as language run time components. The overload detection function is placed in the application run time environment to support the distribution of the load detection mechanism. Using established resource control policies to determine processing control criteria, overloaded resources are managed effectively within the Ada run time environment. A strategy for employing the Ada language primitives and an associated runtime system for dynamic adaptation of embedded battle management applications is presented. The primitives and runtime system have been implemented and have been tested with several parallel battle management applications. An evaluation is presented to assess the implication of the load control experiment findings.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125934257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Some concepts and tools used to verify the time boundaries of sequential software for hard-real-time applications are based on program control flow and the execution time of instructions or blocks. The paper extends a structural approach from sequential to distributed software. It is conceptually and practically based on timed Concurrent Graphs, TCGs, which extend the concept of sequential program d-graphs. The properties of the concurrent exploration of a 'system' of timed concurrent d-graphs are considered, and TCGs are shown to be useful tools for predicting the initial and the steady state worst temporal behaviours of life-time critical distributed static or dynamic systems of messaging only processes, in the maximum pure parallel model. The semantics of Ada-like tasking and communication models are considered. Also, obstacles to predictability are identified and predictable solutions are provided. The proposed approach holds for different tasking and communication models, as shown by an included CSP-like case-study.<>
{"title":"Temporal properties of the timed d-graphs of distributed processes","authors":"G. Cantone","doi":"10.1109/RTA.1993.263100","DOIUrl":"https://doi.org/10.1109/RTA.1993.263100","url":null,"abstract":"Some concepts and tools used to verify the time boundaries of sequential software for hard-real-time applications are based on program control flow and the execution time of instructions or blocks. The paper extends a structural approach from sequential to distributed software. It is conceptually and practically based on timed Concurrent Graphs, TCGs, which extend the concept of sequential program d-graphs. The properties of the concurrent exploration of a 'system' of timed concurrent d-graphs are considered, and TCGs are shown to be useful tools for predicting the initial and the steady state worst temporal behaviours of life-time critical distributed static or dynamic systems of messaging only processes, in the maximum pure parallel model. The semantics of Ada-like tasking and communication models are considered. Also, obstacles to predictability are identified and predictable solutions are provided. The proposed approach holds for different tasking and communication models, as shown by an included CSP-like case-study.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125511864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authors describe a real-time speech application which simulates the human production of natural-language utterances in a two-person conversation. Since generating such utterances is a complex and often time-consuming task, they examine the timing constraints and result-quality requirements of this application, as well as the dependencies between the timing constraints and result qualities of the tasks that generate utterances. They then extend the imprecise computation model to capture these dependencies and discuss the general applicability of the extended model.<>
{"title":"An extended imprecise computation model for time-constrained speech processing and generation","authors":"Wu-chun Feng, J.W.-S. Liu","doi":"10.1109/RTA.1993.263112","DOIUrl":"https://doi.org/10.1109/RTA.1993.263112","url":null,"abstract":"The authors describe a real-time speech application which simulates the human production of natural-language utterances in a two-person conversation. Since generating such utterances is a complex and often time-consuming task, they examine the timing constraints and result-quality requirements of this application, as well as the dependencies between the timing constraints and result qualities of the tasks that generate utterances. They then extend the imprecise computation model to capture these dependencies and discuss the general applicability of the extended model.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authors present a general architecture for a real-time system dedicated to traffic control applications. The proposed system is being developed within the TRACS Esprit III project, and applied to a vessel traffic control application. They focus on the hard real-time aspects of the system, by addressing the design issues of the operating system kernel for achieving predictable and reliable behavior even in worst case conditions.<>
{"title":"TRACS: a flexible real-time environment for traffic control systems","authors":"P. Ancilotti, G. Buttazzo, M. Natale, M. Spuri","doi":"10.1109/RTA.1993.263117","DOIUrl":"https://doi.org/10.1109/RTA.1993.263117","url":null,"abstract":"The authors present a general architecture for a real-time system dedicated to traffic control applications. The proposed system is being developed within the TRACS Esprit III project, and applied to a vessel traffic control application. They focus on the hard real-time aspects of the system, by addressing the design issues of the operating system kernel for achieving predictable and reliable behavior even in worst case conditions.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129243659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. The paper addresses issues that must be investigated in order to design and develop a multilevel secure database management system for real-time applications.<>
{"title":"Towards a multilevel secure database management system for real-time applications","authors":"S. Son, B. Thuraisingham","doi":"10.1109/RTA.1993.263101","DOIUrl":"https://doi.org/10.1109/RTA.1993.263101","url":null,"abstract":"Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. The paper addresses issues that must be investigated in order to design and develop a multilevel secure database management system for real-time applications.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124179376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authors have been involved in the study and design of alternative architectures for computer numerical controller, CNC, machines. The CNC machines are intended to be finally integrated into a school project which aims at developing a complete flexible manufacturing system. They present the overall architecture of the machine. This is necessary to understand the distinction between the real time aspects of the manufacturing application, which uses a real time network. They concentrate on aspects related to the integration of the real time network in this manufacturing environment.<>
{"title":"On real time network integration in a manufacturing application","authors":"P. Raja, J. Hernandez, L. Ruiz","doi":"10.1109/RTA.1993.263124","DOIUrl":"https://doi.org/10.1109/RTA.1993.263124","url":null,"abstract":"The authors have been involved in the study and design of alternative architectures for computer numerical controller, CNC, machines. The CNC machines are intended to be finally integrated into a school project which aims at developing a complete flexible manufacturing system. They present the overall architecture of the machine. This is necessary to understand the distinction between the real time aspects of the manufacturing application, which uses a real time network. They concentrate on aspects related to the integration of the real time network in this manufacturing environment.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121511304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authors present a strategy for software reengineering of applications in the Command, Control, Communications, and Intelligence (C/sup 3/I) domain with focus on the inherent real-time response requirements. The reengineering strategy is presented within the context of a typical DoD-STD-2167A software development life cycle. They define a methodology for software reuse, language translation and application restructure. They provide a reengineering case study of a real-time command and control simulation system from a CMS-2Y to Ada execution environment.<>
{"title":"Software reengineering in a C/sup 3/I domain","authors":"M. Levitz, L. Renda","doi":"10.1109/RTA.1993.263098","DOIUrl":"https://doi.org/10.1109/RTA.1993.263098","url":null,"abstract":"The authors present a strategy for software reengineering of applications in the Command, Control, Communications, and Intelligence (C/sup 3/I) domain with focus on the inherent real-time response requirements. The reengineering strategy is presented within the context of a typical DoD-STD-2167A software development life cycle. They define a methodology for software reuse, language translation and application restructure. They provide a reengineering case study of a real-time command and control simulation system from a CMS-2Y to Ada execution environment.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134541120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents a development environment for the implementation of distributed real-time intelligence in the physical layer of optical telecommunication networks. An investigation is made into the meaning of the term intelligence in present-day telecommunication context. It is shown that the availability of local real-time intelligence on the physical network layer is becoming essential for the design and operation of future networks. An implementation is presented in the form of a layered distributed control system with star topology. After a general description of the system architecture, the paper concentrates on the use of Forth for the implementation of real-time system intelligence. It is further demonstrated that the concept of Forth ideally suits the particular needs of embedded real-time control in optical telecommunication systems.<>
{"title":"Embedded real-time intelligence in the physical layer of telecommunication networks","authors":"V. Vande Keere, B. Meuris, J. Vandewege","doi":"10.1109/RTA.1993.263120","DOIUrl":"https://doi.org/10.1109/RTA.1993.263120","url":null,"abstract":"The paper presents a development environment for the implementation of distributed real-time intelligence in the physical layer of optical telecommunication networks. An investigation is made into the meaning of the term intelligence in present-day telecommunication context. It is shown that the availability of local real-time intelligence on the physical network layer is becoming essential for the design and operation of future networks. An implementation is presented in the form of a layered distributed control system with star topology. After a general description of the system architecture, the paper concentrates on the use of Forth for the implementation of real-time system intelligence. It is further demonstrated that the concept of Forth ideally suits the particular needs of embedded real-time control in optical telecommunication systems.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Himel, S. Allison, P. Grossberg, L. Hendrickson, R. Sass, H. Shoaee
The SLAC Linear Collider now has a total of twenty-four beam-steering feedback loops used to keep the electron and positron beams on their desired trajectories. Seven of these loops measure and control the same beam as it proceeds down the linac through the arcs to the final focus. Ideally each loop should correct only for disturbances that occur between it and the immediate upstream loop. In fact, in the original system each loop corrected for all upstream disturbances. This resulted in undesirable over-correction and ringing. The authors added MIMO (multiple input multiple output) adaptive noise cancellers to separate the signal they wish to correct from disturbances further upstream. This adaptive control improved performance in the 1992 run.<>
{"title":"An adaptive noise cancelling system used for beam control at the Stanford Linear Accelerator Center","authors":"T. Himel, S. Allison, P. Grossberg, L. Hendrickson, R. Sass, H. Shoaee","doi":"10.1109/RTA.1993.263084","DOIUrl":"https://doi.org/10.1109/RTA.1993.263084","url":null,"abstract":"The SLAC Linear Collider now has a total of twenty-four beam-steering feedback loops used to keep the electron and positron beams on their desired trajectories. Seven of these loops measure and control the same beam as it proceeds down the linac through the arcs to the final focus. Ideally each loop should correct only for disturbances that occur between it and the immediate upstream loop. In fact, in the original system each loop corrected for all upstream disturbances. This resulted in undesirable over-correction and ringing. The authors added MIMO (multiple input multiple output) adaptive noise cancellers to separate the signal they wish to correct from disturbances further upstream. This adaptive control improved performance in the 1992 run.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The principal objective of the system development process is to establish a design which satisfies the system requirements and constraints while optimizing the key trade-offs and issues associated with system functionality, behavior, and implementation. The paper describes a formalism for the design of large, complex, and real-time systems that can be captured and analyzed to better meet the systems requirements. An example, the air traffic control system, is used to show the proof of concept of the method.<>
{"title":"A case study of the multi-domain system design capture concept","authors":"N. Hoang, N. Karangelen","doi":"10.1109/RTA.1993.263093","DOIUrl":"https://doi.org/10.1109/RTA.1993.263093","url":null,"abstract":"The principal objective of the system development process is to establish a design which satisfies the system requirements and constraints while optimizing the key trade-offs and issues associated with system functionality, behavior, and implementation. The paper describes a formalism for the design of large, complex, and real-time systems that can be captured and analyzed to better meet the systems requirements. An example, the air traffic control system, is used to show the proof of concept of the method.<<ETX>>","PeriodicalId":293622,"journal":{"name":"[1993] Proceedings of the IEEE Workshop on Real-Time Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117068212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}