Loading...
Search for: execution-times
0.01 seconds
Total 33 records

    Slack clustering for scheduling frame-based tasks on multicore embedded systems

    , Article Microelectronics Journal ; Volume 81 , 2018 , Pages 144-153 ; 00262692 (ISSN) Poursafaei, F ; Bazzaz, M ; Mohajjel Kafshdooz, M ; Ejlali, A ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Adopting multicore platforms is a general trend in real-time embedded systems. However, integrating tasks with different real-time constraints into a single platform presents new design challenges. While it must be guaranteed that hard real-time tasks are able to meet their deadline even in worst case scenarios, firm real-time tasks should be scheduled in a way to achieve high system utilization in order to provide a better quality of service. In this paper, we propose a scheduling scheme for frame-based tasks on real-time multicore embedded systems which is able to guarantee the schedulability of the hard real-time tasks, while it improves the number of executed firm real-time tasks.... 

    BOT-MICS: Bounding time using analytics in mixed-criticality systems

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 41, Issue 10 , 2022 , Pages 3239-3251 ; 02780070 (ISSN) Ranjbar, B ; Hosseinghorban, A ; Sahoo, S. S ; Ejlali, A ; Kumar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    An increasing trend for reducing cost, space, and weight leads to modern embedded systems that execute multiple tasks with different criticality levels on a common hardware platform while guaranteeing a safe operation. In such mixed-criticality (MC) systems, multiple worst case execution times (WCETs) are defined for each task, corresponding to the system operation mode to improve the MC system's timing behavior at runtime. Determining the appropriate WCETs for lower criticality (LC) modes is nontrivial. On the one hand, considering a very low WCET for tasks can improve the processor utilization by scheduling more tasks in that mode, on the other hand, using a larger WCET ensures that the... 

    BOT-MICS: Bounding time using analytics in mixed-criticality systems

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; 2021 ; 02780070 (ISSN) Ranjbar, B ; Hosseinghorban, A ; Sahoo, S. S ; Ejlali, A ; Kumar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    An increasing trend for reducing cost, space, and weight leads to modern embedded systems that execute multiple tasks with different criticality levels on a common hardware platform while guaranteeing a safe operation. In such Mixed-Criticality (MC) systems, multiple Worst-Case Execution Times (WCETs) are defined for each task, corresponding to system operation mode to improve the MC system’s timing behavior at run-time. Determining the appropriate WCETs for lower criticality modes is non-trivial. On the one hand, considering a very low WCET for tasks can improve the processor utilization by scheduling more tasks in that mode, on the other hand, using a larger WCET ensures that the mode... 

    A real-time clearance-based approach for motion planning of mobile robots

    , Article 7th IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, CA, 14 August 2008 through 16 August 2008 ; 2008 , Pages 394-401 ; 9781424425389 (ISBN) Naderan Tahan, M ; Iraji, R ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2008
    Abstract
    In this paper, two different important quality metrics, clearance and execution time, for motion planning of mobile robots are studied. Then a new approach, called Clearance-Based Probabilistic Roadmap Method (CBPRM (c)), is proposed which in contrast to VV(c) method, Visibility-Voronoi with clearance c, beside satisfaction of a predefined clearance is very efficient in running time. This provides the CBPRM (c) to be applicable in dynamic environments which require realtime approaches. Experiments showed that the CBPRM(c) is able to generate paths with very low execution time considering determined clearance. © 2008 IEEE  

    High-Performance predictable NVM-based instruction memory for real-time embedded systems

    , Article IEEE Transactions on Emerging Topics in Computing ; 2018 ; 21686750 (ISSN) Bazzaz, M ; Hoseinghorban, A ; Poursafaei, F ; Ejlali, A ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    Worst case execution time and energy consumption are two of the most important design constraints of real-time embedded systems. Many recent studies have tried to improve the memory subsystem of embedded systems by using emerging non-volatile memories. However, accessing these memories imposes performance and energy overhead and using them as the code memory could increase the worst case execution time of the system. In this paper, a new code memory architecture for non-volatile memories is proposed which reduces the effective memory access latency by employing memory access interleaving technique. Unlike common instruction access latency improvement techniques such as prefetching and... 

    Improving Tasks Response Time in Hard Real-time Systems

    , Ph.D. Dissertation Sharif University of Technology Mohajjel Kafshdooz, Morteza (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    Time constraints are one of the most important concerns in embedded systems. In these systems, to ensure that the system operates correctly in all cases, the worst-case execution time of the system must be less than the deadline. Therefore, reducing worst-case execution time is one of the main design objectives in embedded systems. In addition to time constraints, many embedded systems have energy consumption constraints and hence reducing energy consumption is another main design objective in embedded systems. In this thesis we present two approaches to reduce worst-case execution time as well as an approach to reduce energy consumption while observing time constraints. Our first proposed... 

    Investigation of the Effect of Interleaved Memory on WCET in Real-Time Embedded System

    , M.Sc. Thesis Sharif University of Technology Hossein Ghorban, Ali (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    Worst case execution time (WCET) and energy consumption are two of the most important design constraints of real-time embedded systems and memory subsystem has a major impact on both of them. Therefore, many recent studies have tried to improve the memory subsystem of embedded systems by using emerging non-volatile memories instead of conventional memories such as SRAM and DRAM. Indeed, the low leakage power dissipation and improved density of emerging non-volatile memories, makes them prime candidates for replacing the conventional memories. However, accessing these memories imposes performance and energy overhead and using them as the code memory may increase the WCET.Furthermore, most... 

    Compiler Assisted Architectures for Embedded Systems

    , M.Sc. Thesis Sharif University of Technology Taram, Mohammad Kazem (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    Compile-time optimizations play an important role in the efficient design of real-time embedded systems. Usually, compile-time optimizations are designed to reduce average-case execution time (ACET). While ACET is a main concern in high-performance computing systems, in realtime embedded systems concerns are different and worst-case execution time (WCET) is much more important than ACET. Therefore, WCET reduction is more desirable than ACET reduction in many real-time embedded systems. In this thesis, we propose a compile-time optimization method aimed at reducing WCET in real-time embedded systems. In the proposed method, based on the predicated execution capability of embedded processors,... 

    Performance analysis of android underlying virtual machine in mobile phones

    , Article IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin ; 2012 , Pages 292-295 ; 21666814 (ISSN) ; 9781467315470 (ISBN) Azimzadeh, E ; Sameki, M ; Goudarzi, M ; Sharif University of Technology
    2012
    Abstract
    In recent years, Android is widely used in cell phones. Dalvik is the virtual machine which is embedded inside the Android operating system, and executes the Android-based applications. Thus, improving efficiency of the Dalvik virtual machine plays an important role in optimizing performance of android-based mobile phones. In this paper, we present a comprehensive analysis of the Dalvik bytecodes and their frequency of use in common Android applications and use the results to determine the most frequently used bytecodes in Dalvik virtual machine to identify best targets for improvement. Our analysis showed that over 82% of total execution time of our Android benchmarks is spent by only 5... 

    Biogeography-based optimization of makespan and reliability in grid computing systems

    , Article International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 3 October 2012 through 5 October 2012 ; October , 2012 , Pages 336-342 ; 21570221 (ISSN) ; 9781467320153 (ISBN) Mobini, M. H ; Entezari Maleki, R ; Movaghar, A ; Sharif University of Technology
    2012
    Abstract
    The aim of this paper is to propose a scheduling method to consider reliability along with makespan in grid computing systems. The reliability of task execution is considered in the proposed method to increase the chance of running large-scale and computationally intensive workflows successfully. To handle situations in which a resource failure in a possible scheduling solution occurs, the proposed method finds a collection of scheduling solutions instead of only one solution to run the workflow. It leads to have chance to run an alternative scheduling solution that is not using the failed resource. To find the most optimized scheduling solutions, we exploit the lately developed... 

    Mining distributed frequent itemsets using a gossip based protocol

    , Article Proceedings - IEEE 9th International Conference on Ubiquitous Intelligence and Computing and IEEE 9th International Conference on Autonomic and Trusted Computing, UIC-ATC 2012 ; 2012 , Pages 780-785 Bagheri, M ; Mirian Hosseinabadi, S. H ; Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    2012
    Abstract
    Recently, there has been a growing attention in frequent itemset mining in distributed systems. In this paper, we present an algorithm to extract frequent itemsets from large distributed datasets. Our algorithm uses gossip as the communication mechanism and does not rely on any central node. In gossip based communication, nodes repeatedly select other random nodes in the system, and exchange information with them. Our algorithm proceeds in rounds and provides all nodes with the required support counts of itemsets, such that each node is able to extract the global frequent itemsets. For local iteration and generation of candidate itemsets, a trie data structure is used, which facilitates the... 

    SRF: Matrix completion based on smoothed rank function

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 22 May 2011 through 27 May 2011, Prague ; 2011 , Pages 3672-3675 ; 15206149 (ISSN) ; 9781457705397 (ISBN) Ghasemi, H ; Malek-Mohammadi, M ; Babaie-Zadeh, M ; Jutten, C ; Sharif University of Technology
    2011
    Abstract
    In this paper, we address the matrix completion problem and propose a novel algorithm based on a smoothed rank function (SRF) approximation. Among available algorithms like FPCA and OptSpace, there is no solution that can simultaneously cover wide range of easy and hard problems. This new algorithm provides accurate results in almost all scenarios with a reasonable run time. It especially has low execution time in hard problems where other methods need long time to converge. Furthermore, when the rank is known in advance and is high, our method is very faster than previous methods for the same accuracy. The main idea of the algorithm is based on a continuous and differentiable approximation... 

    A compile-time optimization method for WCET reduction in real-time embedded systems through block formation

    , Article ACM Transactions on Architecture and Code Optimization ; Volume 12, Issue 4 , January , 2015 ; 15443566 (ISSN) Mohajjel Kafshdooz, M ; Taram, M ; Assadi, S ; Ejlali, A ; Sharif University of Technology
    Association for Computing Machinery  2015
    Abstract
    Compile-time optimizations play an important role in the efficient design of real-time embedded systems. Usually, compile-time optimizations are designed to reduce average-case execution time (ACET). While ACET is a main concern in high-performance computing systems, in real-time embedded systems, concerns are different and worst-case execution time (WCET) is much more important than ACET. Therefore, WCET reduction is more desirable than ACET reduction in many real-time embedded systems. In this article, we propose a compile-time optimization method aimed at reducing WCET in real-time embedded systems. In the proposed method, based on the predicated execution capability of embedded... 

    Security and searchability in secret sharing-based data outsourcing

    , Article International Journal of Information Security ; Volume 14, Issue 6 , November , 2015 , Pages 513-529 ; 16155262 (ISSN) Hadavi, M. A ; Jalili, R ; Damiani, E ; Cimato, S ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared... 

    Data locality and VM interference aware mitigation of data skew in hadoop leveraging modern portfolio theory

    , Article 33rd Annual ACM Symposium on Applied Computing, SAC 2018, 9 April 2018 through 13 April 2018 ; 2018 , Pages 175-182 ; 9781450351911 (ISBN) Nabavinejad, S. M ; Goudarzi, M ; ACM Special Interest Group on Applied Computing (SIGAPP) ; Sharif University of Technology
    Association for Computing Machinery  2018
    Abstract
    Data skew, which is the result of uneven distribution of data among tasks in big data processing frameworks such as MapReduce, causes significant variation in the execution time of tasks and makes their placement on computing resources more challenging. Moreover, with the proliferation of big data processing in the cloud, the interference among virtual machines co-located on the same physical machine exacerbates the aforementioned variation. To tackle this challenge, we propose Locality and Interference aware Portfolio-based Task Assignment (LIPTA) approach. LIPTA leverages the modern portfolio theory to mitigate the variation in execution time of tasks while considering the interference of... 

    High-Performance predictable NVM-Based instruction memory for real-time embedded systems

    , Article IEEE Transactions on Emerging Topics in Computing ; Volume 9, Issue 1 , 2021 , Pages 441-455 ; 21686750 (ISSN) Bazzaz, M ; Hoseinghorban, A ; Poursafaei, F ; Ejlali, A ; Sharif University of Technology
    IEEE Computer Society  2021
    Abstract
    Worst case execution time and energy consumption are two of the most important design constraints of real-time embedded systems and memory subsystem has a major impact on both of them. Therefore, many recent studies have tried to improve the memory subsystem of embedded systems by using emerging non-volatile memories instead of conventional memories such as SRAM and DRAM. Indeed, the low leakage power dissipation and improved density of emerging non-volatile memories make them prime candidates for replacing the conventional memories. However, accessing these memories imposes performance and energy overhead and using them as the instruction memory could increase the worst case execution time,... 

    Improving the timing behaviour of mixed-criticality systems using chebyshev's theorem

    , Article 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, 1 February 2021 through 5 February 2021 ; Volume 2021-February , 2021 , Pages 264-269 ; 15301591 (ISSN); 9783981926354 (ISBN) Ranjbar, B ; Hoseinghorban, A ; Sahoo, S. S ; Ejlali, A ; Kumar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In Mixed-Criticality (MC) systems, there are often multiple Worst-Case Execution Times (WCETs) for the same task, corresponding to system operation mode. Determining the appropriate WCETs for lower criticality modes is non-trivial; while on the one hand, a low WCET for a mode can improve the processor utilization in that mode, on the other hand, using a larger WCET ensures that the mode switches are minimized, thereby maximizing the quality-of-service for all tasks, albeit at the cost of processor utilization. Although there are many studies to determine WCET in the highest criticality mode, no analytical solutions are proposed to determine WCETs in other lower criticality modes. In this... 

    Probabilistic load flow in correlated uncertain environment using unscented transformation

    , Article IEEE Transactions on Power Systems ; Vol. 27, issue. 4 , 2012 , p. 2233-2241 ; ISSN: 08858950 Aien, M ; Fotuhi-Firuzabad, M ; Aminifar, F ; Sharif University of Technology
    Abstract
    As a matter of course, the unprecedented ascending penetration of distributed energy resources, mainly harvesting renewable energies, is a direct consequence of environmental concerns. This type of energy resource brings about more uncertainties in power system operation and planning; consequently, it necessitates probabilistic analyses of the system performance. This paper develops a new approach for probabilistic load flow (PLF) evaluation using the unscented transformation (UT) method. The UT method is recognized as a powerful approach in assessing stochastic problems with/without correlated uncertain variables. The capability of the UT method in modeling correlated uncertain variables is... 

    Contingency-constrained PMU placement in power networks

    , Article IEEE Transactions on Power Systems ; Vol. 25, issue. 1 , 2010 , p. 516-523 ; ISSN: 8858950 Aminifar, F ; Khodaei, A ; Fotuhi-Firuzabad, M ; Shahidehpour, M ; Sharif University of Technology
    Abstract
    In this paper, a model for the optimal placement of contingency-constrained phasor measurement units (PMUs) in electric power networks is presented. The conventional complete observability of power networks is first formulated and then, different contingency conditions in power networks including measurement losses and line outages are added to the main model. The communication constraints which would limit the maximum number of measurements associated with each installed PMU is considered as measurement limitations. The relevant formulations are also proposed to make the model more comprehensive. The IEEE standard test systems are examined for the applicability of proposed model. The... 

    Probabilistic load flow in correlated uncertain environment using unscented transformation

    , Article IEEE Transactions on Power Systems ; Volume 27, Issue 4 , 2012 , Pages 2233-2241 ; 08858950 (ISSN) Aien, M ; Fotuhi Firuzabad, M ; Aminifar, F ; Sharif University of Technology
    2012
    Abstract
    As a matter of course, the unprecedented ascending penetration of distributed energy resources, mainly harvesting renewable energies, is a direct consequence of environmental concerns. This type of energy resource brings about more uncertainties in power system operation and planning; consequently, it necessitates probabilistic analyses of the system performance. This paper develops a new approach for probabilistic load flow (PLF) evaluation using the unscented transformation (UT) method. The UT method is recognized as a powerful approach in assessing stochastic problems with/without correlated uncertain variables. The capability of the UT method in modeling correlated uncertain variables is...