Bounding the Response Time of DAG Tasks Using Long Paths

11/16/2022
by   Qingqiang He, et al.
0

In 1969, Graham developed a well-known response time bound for a DAG task using the total workload and the longest path of the DAG, which has been widely applied to solve many scheduling and analysis problems of DAG-based task systems. This paper presents a new response time bound for a DAG task using the total workload and the lengths of multiple long paths of the DAG, instead of the longest path in Graham's bound. Our new bound theoretically dominates and empirically outperforms Graham's bound. We further extend the proposed approach to multi-DAG task systems. Our schedulability test theoretically dominates federated scheduling and outperforms the state-of-the-art by a considerable margin.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/25/2023

Longer Is Shorter: Making Long Paths to Improve the Worst-Case Response Time of DAG Tasks

DAG (directed acyclic graph) tasks are widely used to model parallel rea...
research
05/13/2019

Analysis of Global Fixed-Priority Scheduling for Generalized Sporadic DAG Tasks

We consider global fixed-priority (G-FP) scheduling of parallel tasks, i...
research
03/11/2020

Demand-based Scheduling of Mixed-Criticality Sporadic Tasks on One Processor

Strategies that artificially tighten high-criticality task deadlines in ...
research
08/07/2018

Response Time Bounds for Typed DAG Parallel Tasks on Heterogeneous Multi-cores

Heterogeneous multi-cores utilize the strength of different architecture...
research
08/07/2018

On the Computational Complexity of Length- and Neighborhood-Constrained Path Problems

Finding paths in graphs is a fundamental graph-theoretic task. In this w...
research
03/18/2020

On the Analysis of Parallel Real-Time Tasks with Spin Locks

Locking protocol is an essential component in resource management of rea...
research
09/14/2020

UniFuzz: Optimizing Distributed Fuzzing via Dynamic Centralized Task Scheduling

Fuzzing is one of the most efficient technology for vulnerability detect...

Please sign up or login with your details

Forgot password? Click here to reset