RT-Frontier: A real-time operating system for practical imprecise computation

Hidenori Kobayashi, Nobuyuki Yamasaki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

Imprecise computation is known as an effective technique for dynamically resolving trade-offs between the amount of resources and the quality of the result. However, its implementation and operating system support methods have not been exploited enough from a practical point of view. This paper presents a new approach taken in the RT-Frontier operating system to support imprecise computation. Applications that allow imprecise computation are first transformed to tasks composed of three parts based on an extended imprecise computation model. All tasks are then uniformly scheduled according to a novel scheduling algorithm called Slack Stealer for Optional Parts (SS-OP). The SS-OP algorithm is designed to handle imprecise computations with small overhead, which is at a comparable level of that of the Earliest Deadline First (EDF) algorithm. The results of experiments show that the presented approach is cost-effective enough to be considered as a practical basis for embedded real-time systems.

Original languageEnglish
Title of host publicationProceedings - RTAS 2004 10th IEEE Real-Time and Embedded Technology and Applications Symposium
Pages255-264
Number of pages10
Publication statusPublished - 2004 Nov 17
EventProceedings - RTAS 2004 10th IEEE Real-Time and Embedded Technology and Applications Symposium - Toronto, Canada
Duration: 2004 May 252004 May 28

Publication series

NameProceedings - IEEE Real-Time and Embedded Technology and Applications Symposium
Volume10

Other

OtherProceedings - RTAS 2004 10th IEEE Real-Time and Embedded Technology and Applications Symposium
Country/TerritoryCanada
CityToronto
Period04/5/2504/5/28

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'RT-Frontier: A real-time operating system for practical imprecise computation'. Together they form a unique fingerprint.

Cite this