




Did you find this useful? Give us your feedback
636 citations
...Sha, Rajkumar and Lehoczky introduced the family of priority inheritance protocols as a solution approach to the priority inversion problem [192, 196, 197, 178]....
[...]
...It is the basis of several locking protocols, including the Priority Ceiling Protocol (PCP), [192, 196, 197, 178, 176], the Stack Resource Protocol (SRP) [27], the Ada 95 programming language ceiling locking protocol [29], and the POSIX mutex PTHREAD PRIO PROTECT protocol[64]....
[...]
516 citations
184 citations
...In [58], a xed priority was used for the priority ceiling approach....
[...]
...The priority ceiling scheme in [57, 58] can reduce the blocking time to one transaction execution 16...
[...]
...In [57, 58], a read/write priority ceiling protocol was proposed where a high priority transaction can be blocked by at most the duration of a single low priority transaction....
[...]
144 citations
134 citations
5,397 citations
3,891 citations
2,443 citations
...With only two-phase locking and priority assignment, we can encounter the problem of unbounded priority inversion as illustrated in Example 1. However, the idea of priority inheritance [ 24 ] solves the unbounded priority inversion problem....
[...]
2,031 citations
...Each embedded transaction will follow the two-phase lock protocol [ 6 ], which requires a transaction to acquire all the locks before it releases any lock....
[...]
...For example, we may require each transaction to use a well-known concurrency protocol such as the two-phase lock protocol [ 6 ] and assign priorities to transactions according to some well-known scheduling algorithms such as the earliest deadline algorithm [19]....
[...]
1,582 citations
...An exact characterization of rate-monotonic schedulability can be found in [ 12 ]....
[...]