CSDL Home IEEE Transactions on Dependable and Secure Computing 2009 vol.6 Issue No.04 - October-December

Subscribe

Issue No.04 - October-December (2009 vol.6)

pp: 241-254

Alain Girault , INRIA and Grenoble University, Saint-Ismier Cedex

Hamoudi Kalla , University of Batna, Batna

DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.50

ABSTRACT

We propose a new framework for the (length and reliability) bicriteria static multiprocessor scheduling problem. Our first criterion remains the schedule's length, which is crucial to assess the system's real-time property. For our second criterion, we consider the global system failure rate, seen as if the whole system were a single task scheduled onto a single processor, instead of the usual reliability, because it does not depend on the schedule length like the reliability does (due to its computation in the classical exponential distribution model). Therefore, we control better the replication factor of each individual task of the dependency task graph given as a specification, with respect to the desired failure rate. To solve this bicriteria optimization problem, we take the failure rate as a constraint, and we minimize the schedule length. We are thus able to produce, for a given dependency task graph and multiprocessor architecture, a Pareto curve of nondominated solutions, among which the user can choose the compromise that fits his or her requirements best. Compared to the other bicriteria (length and reliability) scheduling algorithms found in the literature, the algorithm we present here is the first able to improve significantly the reliability, by several orders of magnitude, making it suitable to safety-critical systems.

INDEX TERMS

Reliability, bicriteria optimization, Pareto optima, static multiprocessor scheduling, reliability block diagrams, safety-critical systems.

CITATION

Alain Girault, Hamoudi Kalla, "A Novel Bicriteria Scheduling Heuristics Providing a Guaranteed Global System Failure Rate",

*IEEE Transactions on Dependable and Secure Computing*, vol.6, no. 4, pp. 241-254, October-December 2009, doi:10.1109/TDSC.2008.50REFERENCES