98 J.-P. Steghöfer et al. and all bifurcated message return. It is then able to establish the length <strong>of</strong> the m<strong>in</strong>imal loop it is part <strong>of</strong> by the mechanism described above. This theoretically rather simple procedure becomes tedious when implemented. The ma<strong>in</strong> problem is that it is not certa<strong>in</strong> when a message will arrive at aorg. If the message that went through a cycle arrives before the message that <strong>in</strong>dicates a bifurcation, the agent might have f<strong>in</strong>ished its cycle determ<strong>in</strong>ation already. Special cases might have to be <strong>in</strong>troduced to deal with such a situation. 7.4 Multiple Tasks If resources with several tasks are processed <strong>in</strong> a system simultaneously, circular waits can now be <strong>in</strong>duced by roles that are deal<strong>in</strong>g with different tasks as shown <strong>in</strong> Fig. 3. However, such waits do not necessarily occur <strong>in</strong> every system with more than one task. If resources flow only <strong>in</strong> one direction through the system or if each agent is configured to handle only one task, the proposed approach is still applicable. In the general case, an extended loop detection mechanism would be able to detect circular waits <strong>in</strong>duced by the process<strong>in</strong>g <strong>of</strong> resources with different tasks and reduce this problem to the case <strong>of</strong> loops with several entry po<strong>in</strong>ts. This, however, is left as future work. Fig. 3. Cycles <strong>in</strong>duced by roles deal<strong>in</strong>g with multiple tasks 8 Discussion and Conclusion This paper described mechanisms for fair schedul<strong>in</strong>g and deadlock avoidance based on local knowledge and m<strong>in</strong>imal communication that are suitable for large scale dynamic system with a chang<strong>in</strong>g structure. In comparison to the approaches <strong>in</strong> literature this method is not limited by the computational time that is required to construct and simulate a global graph, works dur<strong>in</strong>g runtime <strong>of</strong> the system and specifies the concrete application <strong>of</strong> the knowledge about potential deadlocks <strong>in</strong> the context <strong>of</strong> the scheduler. It also does not <strong>in</strong>volve a massive amount <strong>of</strong> message pass<strong>in</strong>g and does not underm<strong>in</strong>e the self-organiz<strong>in</strong>g and autonomous properties <strong>of</strong> a system and its entities respectively. Although some details <strong>of</strong> extensions for more complex system structures are not yet fully elaborated, the approach already proves useful and has been implemented <strong>in</strong> the ODP Runtime Environment [24] on a case study <strong>of</strong> an adaptive production cell. The prelim<strong>in</strong>ary results are very encourag<strong>in</strong>g and the open issues will be evaluated and solved with the help <strong>of</strong> this implementation.
On Deadlocks and Fairness <strong>in</strong> Self-organiz<strong>in</strong>g Resource-Flow <strong>Systems</strong> 99 References 1. Abate, A., Innocenzo, A.D., Pola, G., Di Benedetto, M.D., Sastry, S.: The Concept <strong>of</strong> Deadlock and Livelock <strong>in</strong> Hybrid Control <strong>Systems</strong>. In: Bemporad, A., Bicchi, A., Buttazzo, G. (eds.) HSCC 2007. LNCS, vol. 4416, pp. 628–632. Spr<strong>in</strong>ger, Heidelberg (2007) 2. Ashfield, B., Deugo, D., Oppacher, F., White, T.: Distributed Deadlock Detection <strong>in</strong> Mobile Agent <strong>Systems</strong>. In: Hendtlass, T., Ali, M. (eds.) IEA/AIE 2002. LNCS (LNAI), vol. 2358, pp. 146–156. Spr<strong>in</strong>ger, Heidelberg (2002) 3. Banaszak, Z.A., Krogh, B.H.: Deadlock avoidance <strong>in</strong> flexible manufactur<strong>in</strong>g systems with concurrently compet<strong>in</strong>g process flows. IEEE Transactions on Robotics and Automation 6(6), 724–734 (1990) 4. Bandyopadhyay, A.K.: Fairness and conspiracy concepts <strong>in</strong> concurrent systems. SIGSOFT S<strong>of</strong>tw. Eng. <strong>Notes</strong> 34(2), 1–8 (2009) 5. Barbosa, V.C.: Strategies for the prevention <strong>of</strong> communication deadlocks <strong>in</strong> distributed parallel programs. IEEE Transactions on S<strong>of</strong>tware Eng<strong>in</strong>eer<strong>in</strong>g 16(11), 1311–1316 (1990) 6. Belik, F.: An efficient deadlock avoidance technique. IEEE Transactions on <strong>Computer</strong>s 39(7), 882–888 (1990) 7. Bracha, G., Toueg, S.: Distributed deadlock detection. Distributed <strong>Comput<strong>in</strong>g</strong> 2(3), 127–138 (1987) 8. Bustard, D., Hassan, S., McSherry, D., Walmsley, S.: GRAPHIC illustrations <strong>of</strong> autonomic comput<strong>in</strong>g concepts. Innovations <strong>in</strong> <strong>Systems</strong> and S<strong>of</strong>tware Eng<strong>in</strong>eer<strong>in</strong>g 3(1), 61–69 (2007) 9. Buth, B., Peleska, J., Shi, H.: Comb<strong>in</strong><strong>in</strong>g Methods for the Livelock Analysis <strong>of</strong> a Fault-Tolerant System. In: Haeberer, A.M. (ed.) AMAST 1998. LNCS, vol. 1548, p. 124. Spr<strong>in</strong>ger, Heidelberg (1998) 10. C<strong>of</strong>fman, E.G., Elphick, M.J.: System deadlocks. <strong>Comput<strong>in</strong>g</strong> Surveys (1971) 11. Costa, G., Stirl<strong>in</strong>g, C.: Weak and strong fairness <strong>in</strong> CCS. Information and Computation 73(3), 207–244 (1987) 12. Durvy, M., Dousse, O., Thiran, P.: Self-Organization Properties <strong>of</strong> CSMA/CA <strong>Systems</strong> and Their Consequences on Fairness. IEEE Transactions on Information Theory 55(3), 1 (2009) 13. Ezpeleta, J., Colom, J.M., Mart<strong>in</strong>ez, J.: A Petri net based deadlock prevention policy for flexible manufactur<strong>in</strong>g systems. IEEE Transactions on Robotics and Automation 11(2), 173–184 (1995) 14. Fanti, M.P., Zhou, M.C.: Deadlock control methods <strong>in</strong> automated manufactur<strong>in</strong>g systems. IEEE Transactions on <strong>Systems</strong>, Man and Cybernetics, Part A 34(1), 5–22 (2004) 15. Goldman, B.: Deadlock detection <strong>in</strong> computer networks. Technical report, Massachusetts Institute <strong>of</strong> Technology, Cambridge, MA, USA (1977) 16. Güdemann, M., Nafz, F., Ortmeier, F., Seebach, H., Reif, W.: A Specification and Construction Paradigm for Organic <strong>Comput<strong>in</strong>g</strong> <strong>Systems</strong>. In: Proceed<strong>in</strong>gs <strong>of</strong> the 2008 Second IEEE International Conference on Self-Adaptive and Self-Organiz<strong>in</strong>g <strong>Systems</strong>, pp. 233–242. IEEE <strong>Computer</strong> Society, Wash<strong>in</strong>gton (2008) 17. Hsieh, F.S.: Fault-tolerant deadlock avoidance algorithm for assembly processes. IEEE Transactions on <strong>Systems</strong>, Man and Cybernetics, Part A 34(1), 65–79 (2004) 18. Huang, Y.S., Jeng, M.D., Xie, X., Chung, D.H.: Siphon-based deadlock prevention policy for flexible manufactur<strong>in</strong>g systems. IEEE Transactions on <strong>Systems</strong>, Man, and Cybernetics, Part A: <strong>Systems</strong> and Humans 36(6), 1249 (2006)
- Page 2 and 3:
Lecture Notes in Computer Science 5
- Page 4 and 5:
Volume Editors Christian Müller-Sc
- Page 6 and 7:
General Chair Organization Christia
- Page 8 and 9:
Organization IX Hartmut Schmeck Kar
- Page 10 and 11:
Keynote Table of Contents HyVM - Hy
- Page 12 and 13:
Table of Contents XIII JetBench:AnO
- Page 14 and 15:
How to Enhance a Superscalar Proces
- Page 16 and 17:
4 J. Mische et al. The Real-time Vi
- Page 18 and 19:
6 J. Mische et al. 4.1 Instruction
- Page 20 and 21:
8 J. Mische et al. Additionally the
- Page 22 and 23:
10 J. Mische et al. % of unused pip
- Page 24 and 25:
12 J. Mische et al. % of cycles spe
- Page 26 and 27:
14 J. Mische et al. 16. Lickly, B.,
- Page 28 and 29:
16 G. Aşılıoğlu, E.M. Kaya, and
- Page 30 and 31:
18 G. Aşılıoğlu, E.M. Kaya, and
- Page 32 and 33:
20 G. Aşılıoğlu, E.M. Kaya, and
- Page 34 and 35:
22 G. Aşılıoğlu, E.M. Kaya, and
- Page 36 and 37:
24 G. Aşılıoğlu, E.M. Kaya, and
- Page 38 and 39:
26 T.B. Preußer, P. Reichel, and R
- Page 40 and 41:
28 T.B. Preußer, P. Reichel, and R
- Page 42 and 43:
30 T.B. Preußer, P. Reichel, and R
- Page 44 and 45:
32 T.B. Preußer, P. Reichel, and R
- Page 46 and 47:
34 T.B. Preußer, P. Reichel, and R
- Page 48 and 49:
36 T.B. Preußer, P. Reichel, and R
- Page 50 and 51:
38 P. Bellasi, W. Fornaciari, and D
- Page 52 and 53:
40 P. Bellasi, W. Fornaciari, and D
- Page 54 and 55:
42 P. Bellasi, W. Fornaciari, and D
- Page 56 and 57:
44 P. Bellasi, W. Fornaciari, and D
- Page 58 and 59:
46 P. Bellasi, W. Fornaciari, and D
- Page 60 and 61: 48 P. Bellasi, W. Fornaciari, and D
- Page 62 and 63: 50 J. Zeppenfeld and A. Herkersdorf
- Page 64 and 65: 52 J. Zeppenfeld and A. Herkersdorf
- Page 66 and 67: 54 J. Zeppenfeld and A. Herkersdorf
- Page 68 and 69: 56 J. Zeppenfeld and A. Herkersdorf
- Page 70 and 71: 58 J. Zeppenfeld and A. Herkersdorf
- Page 72 and 73: 60 J. Zeppenfeld and A. Herkersdorf
- Page 74 and 75: 62 B. Jakimovski, B. Meyer, and E.
- Page 76 and 77: 64 B. Jakimovski, B. Meyer, and E.
- Page 78 and 79: 66 B. Jakimovski, B. Meyer, and E.
- Page 80 and 81: 68 B. Jakimovski, B. Meyer, and E.
- Page 82 and 83: 70 B. Jakimovski, B. Meyer, and E.
- Page 84 and 85: 72 B. Jakimovski, B. Meyer, and E.
- Page 86 and 87: 74 M. Bonn and H. Schmeck Fig. 1. J
- Page 88 and 89: 76 M. Bonn and H. Schmeck 2.2 Node
- Page 90 and 91: 78 M. Bonn and H. Schmeck Uptime-ba
- Page 92 and 93: 80 M. Bonn and H. Schmeck 2.4 Simul
- Page 94 and 95: 82 M. Bonn and H. Schmeck done rate
- Page 96 and 97: 84 M. Bonn and H. Schmeck Fig. 8. J
- Page 98 and 99: 86 M. Bonn and H. Schmeck tells the
- Page 100 and 101: 88 J.-P. Steghöfer et al. � �
- Page 102 and 103: 90 J.-P. Steghöfer et al. mechanis
- Page 104 and 105: 92 J.-P. Steghöfer et al. resource
- Page 106 and 107: 94 J.-P. Steghöfer et al. Choose a
- Page 108 and 109: 96 J.-P. Steghöfer et al. 1. Defin
- Page 112 and 113: 100 J.-P. Steghöfer et al. 19. Kim
- Page 114 and 115: 102 K. Kloch et al. large-scale sys
- Page 116 and 117: 104 K. Kloch et al. a�t� 1.0 0.
- Page 118 and 119: 106 K. Kloch et al. constant. This
- Page 120 and 121: 108 K. Kloch et al. Relative number
- Page 122 and 123: 110 K. Kloch et al. (a) infection r
- Page 124 and 125: 112 K. Kloch et al. (ii) Phase of a
- Page 126 and 127: 114 P. Petoumenos et al. Studying t
- Page 128 and 129: 116 P. Petoumenos et al. % of Misse
- Page 130 and 131: 118 P. Petoumenos et al. IQ: n 4-in
- Page 132 and 133: 120 P. Petoumenos et al. downsizing
- Page 134 and 135: 122 P. Petoumenos et al. As long as
- Page 136 and 137: 124 P. Petoumenos et al. comparable
- Page 138 and 139: Exploiting Inactive Rename Slots fo
- Page 140 and 141: 128 M. Kayaalp et al. In a supersca
- Page 142 and 143: 130 M. Kayaalp et al. INSTRUCTION 1
- Page 144 and 145: 132 M. Kayaalp et al. time. Alterna
- Page 146 and 147: 134 M. Kayaalp et al. Fig. 3. Numbe
- Page 148 and 149: 136 M. Kayaalp et al. The results o
- Page 150 and 151: Efficient Transaction Nesting in Ha
- Page 152 and 153: 140 Y. Liu et al. HTMs include TCC
- Page 154 and 155: 142 Y. Liu et al. rollback T0 begin
- Page 156 and 157: 144 Y. Liu et al. Processor core Pr
- Page 158 and 159: 146 Y. Liu et al. 5.2 Results and A
- Page 160 and 161:
148 Y. Liu et al. decreases, partia
- Page 162 and 163:
Decentralized Energy-Management to
- Page 164 and 165:
152 B. Becker et al. Furthermore, t
- Page 166 and 167:
154 B. Becker et al. An optimizing
- Page 168 and 169:
156 B. Becker et al. smart-home man
- Page 170 and 171:
158 B. Becker et al. freedom like w
- Page 172 and 173:
160 B. Becker et al. Power [W] 4500
- Page 174 and 175:
EnergySaving Cluster Roll: Power Sa
- Page 176 and 177:
164 M.F. Dolz et al. Themodulequeri
- Page 178 and 179:
166 M.F. Dolz et al. This daemon al
- Page 180 and 181:
168 M.F. Dolz et al. been submitted
- Page 182 and 183:
170 M.F. Dolz et al. On the other h
- Page 184 and 185:
172 M.F. Dolz et al. at the inactiv
- Page 186 and 187:
Effect of the Degree of Neighborhoo
- Page 188 and 189:
176 T. Abdullah et al. A zone based
- Page 190 and 191:
178 T. Abdullah et al. A consumer/p
- Page 192 and 193:
180 T. Abdullah et al. Messages 140
- Page 194 and 195:
182 T. Abdullah et al. (except when
- Page 196 and 197:
184 T. Abdullah et al. % Matchmakin
- Page 198 and 199:
186 T. Abdullah et al. show that th
- Page 200 and 201:
188 M. Schindewolf, D. Kramer, and
- Page 202 and 203:
190 M. Schindewolf, D. Kramer, and
- Page 204 and 205:
192 M. Schindewolf, D. Kramer, and
- Page 206 and 207:
194 M. Schindewolf, D. Kramer, and
- Page 208 and 209:
196 M. Schindewolf, D. Kramer, and
- Page 210 and 211:
198 M. Schindewolf, D. Kramer, and
- Page 212 and 213:
200 R. Plyaskin and A. Herkersdorf
- Page 214 and 215:
202 R. Plyaskin and A. Herkersdorf
- Page 216 and 217:
204 R. Plyaskin and A. Herkersdorf
- Page 218 and 219:
206 R. Plyaskin and A. Herkersdorf
- Page 220 and 221:
208 R. Plyaskin and A. Herkersdorf
- Page 222 and 223:
210 R. Plyaskin and A. Herkersdorf
- Page 224 and 225:
212 M.Y. Qadri, D. Matichard, and K
- Page 226 and 227:
214 M.Y. Qadri, D. Matichard, and K
- Page 228 and 229:
216 M.Y. Qadri, D. Matichard, and K
- Page 230 and 231:
218 M.Y. Qadri, D. Matichard, and K
- Page 232 and 233:
220 M.Y. Qadri, D. Matichard, and K
- Page 234 and 235:
A Tightly Coupled Accelerator Infra
- Page 236 and 237:
224 F. Nowak and R. Buchty where A
- Page 238 and 239:
226 F. Nowak and R. Buchty Fig. 3.
- Page 240 and 241:
228 F. Nowak and R. Buchty Table 2.
- Page 242 and 243:
230 F. Nowak and R. Buchty Table 4.
- Page 244 and 245:
232 F. Nowak and R. Buchty 5.3 Comp
- Page 246 and 247:
Optimizing Stencil Application on M
- Page 248 and 249:
236 F. Xudong et al. compared to th
- Page 250 and 251:
238 F. Xudong et al. stencil comput
- Page 252 and 253:
240 F. Xudong et al. threads in the
- Page 254 and 255:
242 F. Xudong et al. Speedup 14 12
- Page 256 and 257:
244 F. Xudong et al. 5 Related Work
- Page 258:
Abdullah, Tariq 174 Alima, Luc Onan