Real Time Scheduling Theory: A Historical Perspective
نویسندگان
چکیده
منابع مشابه
Real-Time Scheduling Theory
in the directory /pub/techreports. Abstracts and compressed postscript files are available via Real-time, multi-tasking software, such as that used in embedded control systems, is notoriously difficult to develop and maintain. Scheduling theory offers a mathematically-sound way of predicting the timing behaviour of sets of communicating, concurrent tasks, but its principles are often unfamiliar...
متن کاملNeutral theory: a historical perspective.
To resolve a panselectionist paradox, the population geneticist Kimura invented a neutral theory, where each gene is equally likely to enter the next generation whatever its allelic type. To learn what could be explained without invoking Darwinian adaptive divergence, Hubbell devised a similar neutral theory for forest ecology, assuming each tree is equally likely to reproduce whatever its spec...
متن کاملSpermatozoa: A Historical Perspective
The 100,000th scientific article on the subject of spermatozoa was recently published. Many studies have evaluated the characteristics of this important cell leading to great discoveries. Since its first observation and description in 1677, many important characteristics have been described regarding this highly fascinating gamete. In this review, our objective has been to provide a historical ...
متن کاملReal-time Scheduling of a Flexible Manufacturing System using a Two-phase Machine Learning Algorithm
The static and analytic scheduling approach is very difficult to follow and is not always applicable in real-time. Most of the scheduling algorithms are designed to be established in offline environment. However, we are challenged with three characteristics in real cases: First, problem data of jobs are not known in advance. Second, most of the shop’s parameters tend to be stochastic. Third, th...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Real-Time Systems
سال: 2004
ISSN: 0922-6443
DOI: 10.1023/b:time.0000045315.61234.1e