Back to Results
First PageMeta Content
Computer programming / Concurrent computing / Concurrency / Software bugs / Interrupts / Scheduling / Lock / Real-time operating system / Critical section / Computing / Computer architecture / Concurrency control


Lock inference for systems software John Regehr Alastair Reid School of Computing, University of Utah {regehr, reid}@flux.utah.edu ABSTRACT
Add to Reading List

Document Date: 2003-02-23 23:50:06


Open Document

File Size: 97,32 KB

Share Result on Facebook

City

Austin / Orlando / Raleigh / Palo Alto / Cambridge / San Diego / Limerick / /

Company

Microsoft Press / Air Force Research Laboratory / Olin / Las Vegas NV / Compaq / TSL Software / discover using TSL / /

Country

France / Ireland / /

/

Event

Reorganization / /

Facility

Compaq Systems Research Center / University of Utah / Aaron Greenhouse / Air Force Research Laboratory / /

IndustryTerm

software system / component-based systems software / web-based monitoring system / real time / real-time deadlines / timecritical processing / software modules / in component based systems / call chain / oil pipeline / improved algorithms / component systems / systems software / hardware devices / embedded software / resource-constrained embedded systems / search space / Priority inheritance protocols / correct systems / component software / systems software components / event-processing loop / Internet servers / applicationlevel systems software / software contexts / software systems / component-based software / realtime scheduling tool / real-time operating systems / type systems / brute-force algorithm / to static systems / extended type systems / /

OperatingSystem

UNIX / UNIX-like / Microsoft Windows 2000 / TinyOS / Linux / Windows 2000 / RTLinux / /

Organization

Defense Advanced Research Projects Agency / University of Utah / John Regehr Alastair Reid School of Computing / National Science Foundation / /

Person

K. Rustan M. Leino / Albert Lin / Ragunathan Rajkumar / Lui Sha / Conor Madigan / Matthew B. Dwyer / Matthew Flatt / David A. Solomon / James C. Corbett / Alastair Reid / John Lehoczky / Leigh Stoller / Eric Eide / David Culler / Jason Hill / John Hatcliff / David L. Detlefs / Sharad Malik / Greg Nelson / Kristofer Pister / Robby / Gerard J. Holzmann / William L. Scherlis / Victor Yodaiken / Shawn Laubach / Lintao Zhang / Bryan Ford / John Regehr / James B. Saxe / Robert Szewczyk / Greg Benson / Corina S. Pasareanu / Cormac Flanagan / Martin Abadi / Ying Zhao / Mark E. Russinovich / Jay Lepreau / Alec Woo / Seth Hollar / Matthew Moskewicz / /

Position

process scheduler / Hierarchical Scheduling Each scheduler / standard preemptive UNIX timesharing scheduler / scheduler / t1 t2 ∧ t2 t1 / rt / strict priority scheduler / t1 TASK SCHEDULER / event scheduler / scheduler / a non-preemptive event scheduler / editor / non-preemptive scheduler / FIFO scheduler / UNIX timesharing scheduler / CPU scheduler / IRQ scheduler / existing scheduler / particular scheduler / preemptive scheduler / forwardchaining evaluator / scheduler / common scheduler / controller / /

Product

C-1696 / Knit / Windows 2000 / /

ProgrammingLanguage

Java / L / FL / /

ProvinceOrState

Utah / California / Texas / Florida / North Carolina / Massachusetts / /

PublishedMedium

IEEE Transactions on Computers / Lecture Notes in Computer Science / /

Technology

Priority inheritance protocols / model locking protocols / Linux / operating system / brute-force algorithm / Java / UNIX / operating systems / TCP/IP / Ethernet / HTTP / /

SocialTag