计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 523-528.doi: 10.11896/j.issn.1002-137X.2016.11A.118

• 软件工程与数据库技术 • 上一篇    下一篇

并发系统中基于优先级的调度分析

朱振宇,张仕,蒋建民,吴亚洲,杨启帆   

  1. 福建师范大学数学与计算机科学学院福建省网络安全与密码技术重点实验室 福州350007,福建师范大学数学与计算机科学学院福建省网络安全与密码技术重点实验室 福州350007,福建师范大学数学与计算机科学学院福建省网络安全与密码技术重点实验室 福州350007,福建师范大学数学与计算机科学学院福建省网络安全与密码技术重点实验室 福州350007,福建师范大学数学与计算机科学学院福建省网络安全与密码技术重点实验室 福州350007
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家高技术研究发展计划(863)(2012AA011205),国家自然科学基金(61175123),上海知识服务平台项目(ZF1213),上海高可信计算重点实验室开放课题(07dz22304201401),福建省自然科学基金(2014J01221),福建师范大学优秀骨干教师基金(fjsdjk2012047)资助

Analyzing Scheduling Based on Priority in Concurrent Systems

ZHU Zhen-yu, ZHANG Shi, JIANG Jian-min, WU Ya-zhou and YANG Qi-fan   

  • Online:2018-12-01 Published:2018-12-01

摘要: 当前复杂的并发系统多采用模块化、逐步求精和信息隐藏等非形式化的原则来指导系统的开发,而这些指导原则抽象且无法保证分解系统的正确性。为此,对基于优先级控制的系统分解方法展开研究,提出一种系统分解的方法,并在理论上证明该分解方法的正确性。首先采用基于事件的行为模型对系统进行建模;接着定义调度、调度策略和调度策略正确性的概念;然后研究调度策略的分解方法,并证明了调度策略分解方法的正确性;最后根据该方法,开发出一种支持依赖模型建模和调度策略分解的原型工具,通过实例的演示,说明了使用该方法可以把系统分解成若干个子系统,从而设计出正确和有效的调度策略,以达到正确分解系统的目的。

关键词: 优先级,调度策略,分解,正确性

Abstract: Due to the complexity of the concurrent system,it is difficult for engineers to develop a complex system as a whole directly.They often apply informal principles,such as modular,stepwise refinement and information hiding,to guide system development.These guidelines are abstract and can’t guarantee the correct decomposition of system.In this paper,we focused on the system decomposition method based on priority,proposed a method to decompose the system,and proved its correctness.First,we modeled system with an event-based behavioral model.Next,based on such a model,we formally defined the schedule,the scheduling policy and the correctness of a scheduling policy.After that,we proposed a method for decomposing schedule policy,and proved the method’s correctness.Finally,according to the decentralized method,we developed a toolkit,which supports event-based behavioral model,for modeling system and decomposition of scheduling policy.An experiment demonstrates that these results may help engineers to design correct and efficient schedule policies in a system to realize decomposition.

Key words: Priority,Scheduling policy,Decomposition,Correctness

[1] Wing J,et al.Cyber-Physical Systems Summit summary report[R].the April 2008 CPS Summit,St.Louis,MO,2008
[2] Alur R,Courcoubetis C,et al.The algorithmic analysis of hybrid systems[J].Theoretical Computer Science,1995,138:3-34
[3] Bliudze S,Sifakis J.The algebra of connectors:structuring interaction in BIP[C]∥EMSOFT.ACM,2007:11-20
[4] Eidson J C,Lee E A,Matic S,et al.Distributed Real-Time Software for Cyber-Physical Systems[J].Proceedings of the IEEE,2012,100(1):45-59
[5] Jiang J,Zhang S,et al.Configuring business process models[J].ACM SIGSOFT Software Engineering Notes,2013,38(4):1-10
[6] Jiang J,Zhu H,et al.Configuration of Services based on Virtualization[C]∥TASE.2014:178-184
[7] Tan Y,Vuran M C,Goddard S,et al.A concept lattice-based event model for cyber-physical systems[C]∥ICCPS.2010:50-60
[8] Talcott C.Cyber-Physical Systems and Events[M].Software-Intensive Systems and New Computing Paradigms.Berlin,Heidelberg:Springer-Verlag,2008:101-115
[9] Bornot S,Ga G,Sifakis G J.On the construction of live timed systems[M].Graf S,Schwartzbach M.eds.,2000:109-126
[10] Altisen K,Gssler G,Sifakis J.Scheduler modeling based on the controller synthesis paradigm[J].Journal of Real-Time Systems,Special Issue on Control Theoretical Approaches to Real-time Computing,2002,23(1/2):55-84
[11] Zhang F,Szwaykowska K,Wolf W,et al.Task scheduling for control oriented requirements for cyber physical systems[C]∥Real-Time Systems Symposium.2008:47-56
[12] Li Q.Scheduling in Cyber-Physical Systems[J].Dissertations,2012:91
[13] Li Q,Negi R.Maximal scheduling in wireless ad hoc networks with hypergraph interference models[J].IEEE Transactions on Vehicular Technology,2012,61(1):297-310
[14] Tang Q,Gupta S K S,Varsamopoulos G.A Unified Methodology for Scheduling in Distributed Cyber-Physical Systems.ACM Trans[J].Embedded Comput.Syst.,2012,11(S2):57
[15] Hennessy M,Lin H.Symbolic Bisimulations[J].Theor.Comput.Sci.,1995,138(2):353-389
[16] Jiang J,Zhang S,et al.Modeling and analyzing mixed communications in service-oriented trustworthy software[J].Science China Information Science,2012,55(12):2738-2756
[17] Lanese I,Bedogni L,Di Felice M.Internet of things:a process calculus approach[J].SAC,2013:1339-1346
[18] Winskel G,Nielsen M.Models for Concurrency,Handbook ofLogic in Computer Science,Semantic Modelling[J].Oxford Science Publications,Oxford,1995,4:1-148
[19] Jiang J,Zhang S,et al.Configuring business process models[J].ACM SIGSOFT Software Engineering Notes,2013,38(4):1-10
[20] Jiang J,Zhang S,et al.Message Dependency-Based Adaptation of Services[J].APSCC,2011:442-449
[21] Finkel A,Leroux J.Recent and simple algorithms for Petri nets[J].Software & Systems Modeling,2015,4(2):719-7251
[22] Folschette M,Paulevé L,Magnin M,et al.Sufficient Conditions for Reachability in Automata Networks with Priorities[J].Theoretical Computer Science,2015,608:66-83

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!