Thursday, September 9, 2010

p9 Energy-Efficient Real-Time Task Scheduling with Temperature-Dependent Leakage

Abstract—Leakage power consumption contributes significantly
to the overall power dissipation for systems that are
manufactured in advanced deep sub-micron technology.

I. INTRODUCTION
Due to the urgent demand to prolong the life time of
batteries in embedded systems and to reduce power bills
for cutting the maintenance cost in server systems, power
management has become a prominent system design issue.

Recently, it has been shown that leakage current is highly
dependent upon the temperature and it goes up rapidly when
the temperature increases [7], [8]. For example, the leakage
current in 65nm technology in [7] will increase by 21%

This paper explores how to execute a given periodic workload
under its timing constraint on a processor so that the
energy consumption is minimized, where the leakage current
is temperature-dependent.
when the temperature is raised from 60◦C to 80◦C.

Monday, August 9, 2010

02.2-2 Loosely Time-Triggered Architectures for Cyber-Physical Systems

Abstract
I. INTRODUCTION
A. From Federated to Integrated Architectures
B. TTA as a vision of System Architecture
C. LTTA: why and what?
(page 3)
The LTT bus based on CbS was first proposed in [4] and studied for a single writer-reader pair and [19] proposes a variation of LTTA where some master-slave re-synchronization of clocks is performed.
In this paper we discuss the novel issues LTTA raises due to the artifacts caused by CbS communication

II. USE OF LTTA AND ARTIFACTS
Use for discrete control and supervision: Discrete systems such as finite state machines are generally not robust against duplication or loss of data.
(page 3 col 2)

III. TWO PROTOCOLS FOR LTTA
A. Back-Pressure LTTA
Elastic circuits were proposed in [10], [12], [9] as a semantic
preserving architecture in which Kahn Process Network
[13] type of execution is performed using bounded
buffers.

In our study, however, we cannot make direct use of elastic
circuits since the activation of nodes in elastic circuits is
triggered by tokens,

Figure 6 depicts net Nji associated to each directed link
j ! i of the architecture.

(page 4 col 2)

B. Time-Based LTTA
IV. CONCLUSION

01.1_key 2 Wireless Communication – Successful Differentiation on Standard Technology by Innovation