% $ biblatex auxiliary file $ % $ biblatex bbl format version 2.4 $ % Do not modify the above lines! % % This is an auxiliary file used by the 'biblatex' package. % This file may safely be deleted. It will be recreated by % biber as required. % \begingroup \makeatletter \@ifundefined{ver@biblatex.sty} {\@latex@error {Missing 'biblatex' package} {The bibliography requires the 'biblatex' package.} \aftergroup\endinput} {} \endgroup \refsection{0} \sortlist{nty}{nty} \entry{media}{inproceedings}{} \name{labelname}{2}{}{% {{hash=5993c8d59805c5c32213514a21245661}{Abeni}{A\bibinitperiod}{}{}{}{}{}{}}% {{hash=c544c09ffde3f67b1e11ea7c1b991b38}{Buttazzo}{B\bibinitperiod}{}{}{}{}{}{}}% } \name{author}{2}{}{% {{hash=5993c8d59805c5c32213514a21245661}{Abeni}{A\bibinitperiod}{}{}{}{}{}{}}% {{hash=c544c09ffde3f67b1e11ea7c1b991b38}{Buttazzo}{B\bibinitperiod}{}{}{}{}{}{}}% } \strng{namehash}{06e8cddb84efca86b8c34d114137ddea} \strng{fullhash}{06e8cddb84efca86b8c34d114137ddea} \field{sortinit}{A} \field{sortinithash}{c8a29dea43e9d2645817723335a4dbe8} \field{labeltitle}{Integrating Multimedia Applications in Hard Real-Time Systems} \field{booktitle}{Real-Time Systems Symposium. 19th IEEE Proceedings} \field{title}{Integrating Multimedia Applications in Hard Real-Time Systems} \field{year}{1998} \endentry \entry{heechul}{report}{} \name{labelname}{1}{}{% {{hash=749176648be45349a8997f27ab72c6b5}{al.}{a\bibinitperiod}{Heechul\bibnamedelima Yun}{H\bibinitperiod\bibinitdelim Y\bibinitperiod}{et}{e\bibinitperiod}{}{}}% } \name{author}{1}{}{% {{hash=749176648be45349a8997f27ab72c6b5}{al.}{a\bibinitperiod}{Heechul\bibnamedelima Yun}{H\bibinitperiod\bibinitdelim Y\bibinitperiod}{et}{e\bibinitperiod}{}{}}% } \list{institution}{1}{% {University of Illinois at Urbana-Champaigne}% } \strng{namehash}{749176648be45349a8997f27ab72c6b5} \strng{fullhash}{749176648be45349a8997f27ab72c6b5} \field{sortinit}{a} \field{sortinithash}{c8a29dea43e9d2645817723335a4dbe8} \field{labeltitle}{MemGuard: Memory bandwidth reservation system for efficient performance isolation in multi-core platforms} \field{title}{MemGuard: Memory bandwidth reservation system for efficient performance isolation in multi-core platforms} \field{type}{\unskip\space} \field{year}{2013} \endentry \entry{hyoseung}{report}{} \name{labelname}{1}{}{% {{hash=a91ad1fdb4eb0ea505382ee1e71c39ff}{al.}{a\bibinitperiod}{Hyoseung\bibnamedelima Kim}{H\bibinitperiod\bibinitdelim K\bibinitperiod}{et}{e\bibinitperiod}{}{}}% } \name{author}{1}{}{% {{hash=a91ad1fdb4eb0ea505382ee1e71c39ff}{al.}{a\bibinitperiod}{Hyoseung\bibnamedelima Kim}{H\bibinitperiod\bibinitdelim K\bibinitperiod}{et}{e\bibinitperiod}{}{}}% } \list{institution}{1}{% {Carnegie Mellon University}% } \strng{namehash}{a91ad1fdb4eb0ea505382ee1e71c39ff} \strng{fullhash}{a91ad1fdb4eb0ea505382ee1e71c39ff} \field{sortinit}{a} \field{sortinithash}{c8a29dea43e9d2645817723335a4dbe8} \field{labeltitle}{Bounding memory interference delay in COTS-based multi-core systems} \field{title}{Bounding memory interference delay in COTS-based multi-core systems} \field{type}{\unskip\space} \field{year}{2014} \endentry \entry{rtssva}{book}{} \name{labelname}{1}{}{% {{hash=a2aa86e6eaec9f896233dae7e46b20f2}{al}{a\bibinitperiod}{Mathai\bibnamedelima Joseph}{M\bibinitperiod\bibinitdelim J\bibinitperiod}{et.}{e\bibinitperiod}{}{}}% } \name{author}{1}{}{% {{hash=a2aa86e6eaec9f896233dae7e46b20f2}{al}{a\bibinitperiod}{Mathai\bibnamedelima Joseph}{M\bibinitperiod\bibinitdelim J\bibinitperiod}{et.}{e\bibinitperiod}{}{}}% } \list{publisher}{1}{% {Prentice Hall}% } \strng{namehash}{a2aa86e6eaec9f896233dae7e46b20f2} \strng{fullhash}{a2aa86e6eaec9f896233dae7e46b20f2} \field{sortinit}{a} \field{sortinithash}{c8a29dea43e9d2645817723335a4dbe8} \field{labeltitle}{Real-time Systems: Specification, Verification, and Analysis} \field{isbn}{0-13-455297-0} \field{title}{Real-time Systems: Specification, Verification, and Analysis} \field{year}{1996} \endentry \entry{memory-architectures-for-noc-based}{report}{} \name{labelname}{1}{}{% {{hash=5ae30a9b5cd9ba661fbd74515a9cbc1d}{Audsley}{A\bibinitperiod}{Neil}{N\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=5ae30a9b5cd9ba661fbd74515a9cbc1d}{Audsley}{A\bibinitperiod}{Neil}{N\bibinitperiod}{}{}{}{}}% } \list{institution}{1}{% {Department of Computer Science, University of York, UK}% } \strng{namehash}{5ae30a9b5cd9ba661fbd74515a9cbc1d} \strng{fullhash}{5ae30a9b5cd9ba661fbd74515a9cbc1d} \field{sortinit}{A} \field{sortinithash}{c8a29dea43e9d2645817723335a4dbe8} \field{labeltitle}{Memory architectures for NoC-based real-time mixed criticality systems} \field{title}{Memory architectures for NoC-based real-time mixed criticality systems} \field{type}{\unskip\space} \field{year}{2013} \endentry \entry{rtspls}{book}{} \name{labelname}{2}{}{% {{hash=590f62b35d43821ff74fcfc5219899fd}{Burns}{B\bibinitperiod}{}{}{}{}{}{}}% {{hash=68b25b854c2e94ed37a1bdae8e94e6d7}{Wellings}{W\bibinitperiod}{}{}{}{}{}{}}% } \name{author}{2}{}{% {{hash=590f62b35d43821ff74fcfc5219899fd}{Burns}{B\bibinitperiod}{}{}{}{}{}{}}% {{hash=68b25b854c2e94ed37a1bdae8e94e6d7}{Wellings}{W\bibinitperiod}{}{}{}{}{}{}}% } \list{publisher}{1}{% {Addison-Wesley}% } \strng{namehash}{c06b60f5ee7a95525c477422ce6484c7} \strng{fullhash}{c06b60f5ee7a95525c477422ce6484c7} \field{sortinit}{B} \field{sortinithash}{1a3a21dbed09540af12d49a0b14f4751} \field{labeltitle}{Real-Time Systems and Programming Languages} \field{edition}{Second edition} \field{isbn}{0-201-40365-X} \field{title}{Real-Time Systems and Programming Languages} \field{year}{1997} \endentry \entry{lang}{book}{} \name{labelname}{2}{}{% {{hash=590f62b35d43821ff74fcfc5219899fd}{Burns}{B\bibinitperiod}{}{}{}{}{}{}}% {{hash=68b25b854c2e94ed37a1bdae8e94e6d7}{Wellings}{W\bibinitperiod}{}{}{}{}{}{}}% } \name{author}{2}{}{% {{hash=590f62b35d43821ff74fcfc5219899fd}{Burns}{B\bibinitperiod}{}{}{}{}{}{}}% {{hash=68b25b854c2e94ed37a1bdae8e94e6d7}{Wellings}{W\bibinitperiod}{}{}{}{}{}{}}% } \list{publisher}{1}{% {Addison-Wesley}% } \strng{namehash}{c06b60f5ee7a95525c477422ce6484c7} \strng{fullhash}{c06b60f5ee7a95525c477422ce6484c7} \field{sortinit}{B} \field{sortinithash}{1a3a21dbed09540af12d49a0b14f4751} \field{labeltitle}{Real-Time Systems and Programming Languages: Ada, Real-Time Java and C/Real-Time POSIX} \field{edition}{Fourth edition} \field{isbn}{978-0-321-41745-9} \field{title}{Real-Time Systems and Programming Languages: Ada, Real-Time Java and C/Real-Time POSIX} \field{year}{2009} \endentry \entry{dyson}{book}{} \name{labelname}{1}{}{% {{hash=94bb3ebcaa7b3c47d6f6fe099a88e767}{Dyson}{D\bibinitperiod}{Peter}{P\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=94bb3ebcaa7b3c47d6f6fe099a88e767}{Dyson}{D\bibinitperiod}{Peter}{P\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {SYBEX}% } \strng{namehash}{94bb3ebcaa7b3c47d6f6fe099a88e767} \strng{fullhash}{94bb3ebcaa7b3c47d6f6fe099a88e767} \field{sortinit}{D} \field{sortinithash}{a01c54d1737685bc6dbf0ea0673fa44c} \field{labeltitle}{The Unix Desk Reference: The hu.man Pages} \field{isbn}{0-7821-1658-2} \field{title}{The Unix Desk Reference: The hu.man Pages} \field{year}{1996} \endentry \entry{privatization-and-fixed-priority-scheduling}{report}{} \name{labelname}{4}{}{% {{hash=577e82f123e8ea361612b49bf6d4202b}{Ecco}{E\bibinitperiod}{Leonardo}{L\bibinitperiod}{}{}{}{}}% {{hash=62b5b8c1ce87717aeea708f63e407dcf}{Ernst}{E\bibinitperiod}{Rolf}{R\bibinitperiod}{}{}{}{}}% {{hash=4de9ed4c3b68a44bedeb1b3268dc5c91}{Saidi}{S\bibinitperiod}{Selma}{S\bibinitperiod}{}{}{}{}}% {{hash=752d4cc47b3695d57ba0f5cebaa80dec}{Tobuschat}{T\bibinitperiod}{Sebastian}{S\bibinitperiod}{}{}{}{}}% } \name{author}{4}{}{% {{hash=577e82f123e8ea361612b49bf6d4202b}{Ecco}{E\bibinitperiod}{Leonardo}{L\bibinitperiod}{}{}{}{}}% {{hash=62b5b8c1ce87717aeea708f63e407dcf}{Ernst}{E\bibinitperiod}{Rolf}{R\bibinitperiod}{}{}{}{}}% {{hash=4de9ed4c3b68a44bedeb1b3268dc5c91}{Saidi}{S\bibinitperiod}{Selma}{S\bibinitperiod}{}{}{}{}}% {{hash=752d4cc47b3695d57ba0f5cebaa80dec}{Tobuschat}{T\bibinitperiod}{Sebastian}{S\bibinitperiod}{}{}{}{}}% } \list{institution}{2}{% {Institute of Computer}% {Network Engineering, TU Braunschweig, Germany}% } \strng{namehash}{ff8d105e377b635322f313a74762842e} \strng{fullhash}{28d151738cf18c032b371d77ff7359a3} \field{sortinit}{E} \field{sortinithash}{655e26c7438ff123e5c69c6c3f702107} \field{labeltitle}{Privatization and Fixed Priority Scheduling} \field{title}{Privatization and Fixed Priority Scheduling} \field{type}{\unskip\space} \field{year}{2014} \endentry \entry{workload-aware-shaping-of-shared}{report}{} \name{labelname}{4}{}{% {{hash=577e82f123e8ea361612b49bf6d4202b}{Ecco}{E\bibinitperiod}{Leonardo}{L\bibinitperiod}{}{}{}{}}% {{hash=62b5b8c1ce87717aeea708f63e407dcf}{Ernst}{E\bibinitperiod}{Rolf}{R\bibinitperiod}{}{}{}{}}% {{hash=14bba3147117af143aa2907c66548798}{Neukirchner}{N\bibinitperiod}{Moritz}{M\bibinitperiod}{}{}{}{}}% {{hash=752d4cc47b3695d57ba0f5cebaa80dec}{Tobuschat}{T\bibinitperiod}{Sebastian}{S\bibinitperiod}{}{}{}{}}% } \name{author}{4}{}{% {{hash=577e82f123e8ea361612b49bf6d4202b}{Ecco}{E\bibinitperiod}{Leonardo}{L\bibinitperiod}{}{}{}{}}% {{hash=62b5b8c1ce87717aeea708f63e407dcf}{Ernst}{E\bibinitperiod}{Rolf}{R\bibinitperiod}{}{}{}{}}% {{hash=14bba3147117af143aa2907c66548798}{Neukirchner}{N\bibinitperiod}{Moritz}{M\bibinitperiod}{}{}{}{}}% {{hash=752d4cc47b3695d57ba0f5cebaa80dec}{Tobuschat}{T\bibinitperiod}{Sebastian}{S\bibinitperiod}{}{}{}{}}% } \list{institution}{2}{% {Institute of Computer}% {Network Engineering, Technische Universität Braunschweig}% } \strng{namehash}{ff8d105e377b635322f313a74762842e} \strng{fullhash}{24c52a8c40d3eed9e15ff342868adc1c} \field{sortinit}{E} \field{sortinithash}{655e26c7438ff123e5c69c6c3f702107} \field{labeltitle}{Workload-aware Shaping of Shared Resource Accesses in Mixed-criticality Systems} \field{title}{Workload-aware Shaping of Shared Resource Accesses in Mixed-criticality Systems} \field{type}{\unskip\space} \field{year}{2014} \endentry \entry{mapping-mixed-criticality-applications-on}{report}{} \name{labelname}{4}{}{% {{hash=ba28222b626fdeb22b50e99ae87b6125}{Giannopoulou}{G\bibinitperiod}{Georgia}{G\bibinitperiod}{}{}{}{}}% {{hash=0dec2591a7e5ff22e67125c2b20b5196}{Huang}{H\bibinitperiod}{Pengcheng}{P\bibinitperiod}{}{}{}{}}% {{hash=d6070efaf1f6626687720d66abe7f23d}{Stoimenov}{S\bibinitperiod}{Nikolay}{N\bibinitperiod}{}{}{}{}}% {{hash=443849b4c8bfc03386052ff0243f508c}{Thiele}{T\bibinitperiod}{Lothar}{L\bibinitperiod}{}{}{}{}}% } \name{author}{4}{}{% {{hash=ba28222b626fdeb22b50e99ae87b6125}{Giannopoulou}{G\bibinitperiod}{Georgia}{G\bibinitperiod}{}{}{}{}}% {{hash=0dec2591a7e5ff22e67125c2b20b5196}{Huang}{H\bibinitperiod}{Pengcheng}{P\bibinitperiod}{}{}{}{}}% {{hash=d6070efaf1f6626687720d66abe7f23d}{Stoimenov}{S\bibinitperiod}{Nikolay}{N\bibinitperiod}{}{}{}{}}% {{hash=443849b4c8bfc03386052ff0243f508c}{Thiele}{T\bibinitperiod}{Lothar}{L\bibinitperiod}{}{}{}{}}% } \list{institution}{2}{% {Computer Engineering}% {Networks Laboratory, ETH Zurich, 8092 Zurich, Switzerland}% } \strng{namehash}{e9833612afa631054fad555ef0e15e4e} \strng{fullhash}{b2ee1951e531a912511e5a0f91d7044c} \field{sortinit}{G} \field{sortinithash}{480ee01f9ffd559b3258d822f54a8ac2} \field{labeltitle}{Mapping Mixed-Criticality Applications on Multi-Core Architectures} \field{title}{Mapping Mixed-Criticality Applications on Multi-Core Architectures} \field{type}{\unskip\space} \field{year}{2013} \endentry \entry{scheduling-of-mixed-criticality-applications}{report}{} \name{labelname}{4}{}{% {{hash=ba28222b626fdeb22b50e99ae87b6125}{Giannopoulou}{G\bibinitperiod}{Georgia}{G\bibinitperiod}{}{}{}{}}% {{hash=d6070efaf1f6626687720d66abe7f23d}{Stoimenov}{S\bibinitperiod}{Nikolay}{N\bibinitperiod}{}{}{}{}}% {{hash=0dec2591a7e5ff22e67125c2b20b5196}{Huang}{H\bibinitperiod}{Pengcheng}{P\bibinitperiod}{}{}{}{}}% {{hash=443849b4c8bfc03386052ff0243f508c}{Thiele}{T\bibinitperiod}{Lothar}{L\bibinitperiod}{}{}{}{}}% } \name{author}{4}{}{% {{hash=ba28222b626fdeb22b50e99ae87b6125}{Giannopoulou}{G\bibinitperiod}{Georgia}{G\bibinitperiod}{}{}{}{}}% {{hash=d6070efaf1f6626687720d66abe7f23d}{Stoimenov}{S\bibinitperiod}{Nikolay}{N\bibinitperiod}{}{}{}{}}% {{hash=0dec2591a7e5ff22e67125c2b20b5196}{Huang}{H\bibinitperiod}{Pengcheng}{P\bibinitperiod}{}{}{}{}}% {{hash=443849b4c8bfc03386052ff0243f508c}{Thiele}{T\bibinitperiod}{Lothar}{L\bibinitperiod}{}{}{}{}}% } \list{institution}{2}{% {Computer Engineering}% {Networks Laboratory, ETH Zurich, 8092 Zurich, Switzerland}% } \strng{namehash}{e9833612afa631054fad555ef0e15e4e} \strng{fullhash}{2cd42df65d8bd150011ce07fb606c431} \field{sortinit}{G} \field{sortinithash}{480ee01f9ffd559b3258d822f54a8ac2} \field{labeltitle}{Scheduling of Mixed-Criticality Applications on Resource-Sharing Multicore Systems} \field{title}{Scheduling of Mixed-Criticality Applications on Resource-Sharing Multicore Systems} \field{type}{\unskip\space} \field{year}{2013} \endentry \entry{linux}{book}{} \name{labelname}{1}{}{% {{hash=96022a43cc377931a3f46b15ae35eeb8}{Kofler}{K\bibinitperiod}{Michael}{M\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=96022a43cc377931a3f46b15ae35eeb8}{Kofler}{K\bibinitperiod}{Michael}{M\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {Addison-Wesley}% } \strng{namehash}{96022a43cc377931a3f46b15ae35eeb8} \strng{fullhash}{96022a43cc377931a3f46b15ae35eeb8} \field{sortinit}{K} \field{sortinithash}{33bf4c961fa093ee6a297ccbd88eacc0} \field{labeltitle}{Linux: Installation, Configuration, and Use} \field{edition}{Second Edition} \field{isbn}{0201596288} \field{title}{Linux: Installation, Configuration, and Use} \field{year}{1999} \endentry \entry{periodicmodel}{article}{} \name{labelname}{2}{}{% {{hash=6be9a6e2df4d3fc637155d4ffa86be8f}{Layland}{L\bibinitperiod}{James}{J\bibinitperiod}{}{}{}{}}% {{hash=9d9ac6815e27331ba6620def723e357f}{Liu}{L\bibinitperiod}{Chang}{C\bibinitperiod}{}{}{}{}}% } \name{author}{2}{}{% {{hash=6be9a6e2df4d3fc637155d4ffa86be8f}{Layland}{L\bibinitperiod}{James}{J\bibinitperiod}{}{}{}{}}% {{hash=9d9ac6815e27331ba6620def723e357f}{Liu}{L\bibinitperiod}{Chang}{C\bibinitperiod}{}{}{}{}}% } \strng{namehash}{07e4dec05428376b07da16705871f809} \strng{fullhash}{07e4dec05428376b07da16705871f809} \field{sortinit}{L} \field{sortinithash}{c41a2b5886eeae464e75d1a9df4cd13e} \field{labeltitle}{Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment} \field{journaltitle}{JACM} \field{number}{1} \field{title}{Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment} \field{volume}{20} \field{year}{1973} \endentry \entry{advunix}{book}{} \name{labelname}{1}{}{% {{hash=49fec951c0d44972a3bd84d9e2184905}{Leach}{L\bibinitperiod}{Ronald}{R\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=49fec951c0d44972a3bd84d9e2184905}{Leach}{L\bibinitperiod}{Ronald}{R\bibinitperiod}{}{}{}{}}% } \list{publisher}{2}{% {John Wiley}% {Sons}% } \strng{namehash}{49fec951c0d44972a3bd84d9e2184905} \strng{fullhash}{49fec951c0d44972a3bd84d9e2184905} \field{sortinit}{L} \field{sortinithash}{c41a2b5886eeae464e75d1a9df4cd13e} \field{labeltitle}{Advanced Topics in UNIX: Processes, Files, and Systems} \field{isbn}{0-471-03663-3} \field{title}{Advanced Topics in UNIX: Processes, Files, and Systems} \field{year}{1994} \endentry \entry{mok}{book}{} \name{labelname}{1}{}{% {{hash=e54fa8af4823e9ef38715ec43a2719ef}{Mok}{M\bibinitperiod}{Aloysius}{A\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=e54fa8af4823e9ef38715ec43a2719ef}{Mok}{M\bibinitperiod}{Aloysius}{A\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {Massachusetts Institute of Technology}% } \strng{namehash}{e54fa8af4823e9ef38715ec43a2719ef} \strng{fullhash}{e54fa8af4823e9ef38715ec43a2719ef} \field{sortinit}{M} \field{sortinithash}{4203d16473bc940d4ac780773cb7c5dd} \field{labeltitle}{Fundamental design problems of distributed systems for the hard-real-time environment} \field{title}{Fundamental design problems of distributed systems for the hard-real-time environment} \field{year}{1983} \endentry \entry{multiframe}{article}{} \name{labelname}{2}{}{% {{hash=e54fa8af4823e9ef38715ec43a2719ef}{Mok}{M\bibinitperiod}{Aloysius}{A\bibinitperiod}{}{}{}{}}% {{hash=65d3805cd5abaca2655563b2732350e4}{Chen}{C\bibinitperiod}{Deji}{D\bibinitperiod}{}{}{}{}}% } \name{author}{2}{}{% {{hash=e54fa8af4823e9ef38715ec43a2719ef}{Mok}{M\bibinitperiod}{Aloysius}{A\bibinitperiod}{}{}{}{}}% {{hash=65d3805cd5abaca2655563b2732350e4}{Chen}{C\bibinitperiod}{Deji}{D\bibinitperiod}{}{}{}{}}% } \strng{namehash}{42eb6386fc20c4c3ec5ace27b06f4704} \strng{fullhash}{42eb6386fc20c4c3ec5ace27b06f4704} \field{sortinit}{M} \field{sortinithash}{4203d16473bc940d4ac780773cb7c5dd} \field{labeltitle}{A Multiframe Model for Real-Time Tasks} \field{journaltitle}{IEEE Transactions on Software Engineering} \field{title}{A Multiframe Model for Real-Time Tasks} \field{volume}{23} \field{year}{1996} \endentry \entry{baruah}{article}{} \name{labelname}{1}{}{% {{hash=3b0f10e932e60fe40b2c4ec9294c650e}{Sanjoy\bibnamedelima Baruah}{S\bibinitperiod\bibinitdelim B\bibinitperiod}{Rodney\bibnamedelima Howell}{R\bibinitperiod\bibinitdelim H\bibinitperiod}{}{}{Louis\bibnamedelima Rosier}{L\bibinitperiod\bibinitdelim R\bibinitperiod}}% } \name{author}{1}{}{% {{hash=3b0f10e932e60fe40b2c4ec9294c650e}{Sanjoy\bibnamedelima Baruah}{S\bibinitperiod\bibinitdelim B\bibinitperiod}{Rodney\bibnamedelima Howell}{R\bibinitperiod\bibinitdelim H\bibinitperiod}{}{}{Louis\bibnamedelima Rosier}{L\bibinitperiod\bibinitdelim R\bibinitperiod}}% } \strng{namehash}{3b0f10e932e60fe40b2c4ec9294c650e} \strng{fullhash}{3b0f10e932e60fe40b2c4ec9294c650e} \field{sortinit}{S} \field{sortinithash}{4125bb4c3a0eb3eaee3ea6da32eb70c8} \field{labeltitle}{Algorithms and complexity concerning the preemptive scheduling of periodic, real-time tasks on one processor} \field{issue}{4} \field{journaltitle}{Real-Time Systems} \field{title}{Algorithms and complexity concerning the preemptive scheduling of periodic, real-time tasks on one processor} \field{volume}{2} \field{year}{1990} \endentry \entry{rtss}{book}{} \name{labelname}{1}{}{% {{hash=c1b68098464c151cae52290cec6ef603}{Shaw}{S\bibinitperiod}{Alan}{A\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=c1b68098464c151cae52290cec6ef603}{Shaw}{S\bibinitperiod}{Alan}{A\bibinitperiod}{}{}{}{}}% } \list{publisher}{2}{% {John Wiley}% {Sons}% } \strng{namehash}{c1b68098464c151cae52290cec6ef603} \strng{fullhash}{c1b68098464c151cae52290cec6ef603} \field{sortinit}{S} \field{sortinithash}{4125bb4c3a0eb3eaee3ea6da32eb70c8} \field{labeltitle}{Real-Time Systems and Software} \field{isbn}{0-471-35490-2} \field{title}{Real-Time Systems and Software} \field{year}{2001} \endentry \entry{ieee_hs}{article}{} \name{labelname}{2}{}{% {{hash=ae346f57e0d97f85269d15d46e62ae4b}{Shin}{S\bibinitperiod}{Insik}{I\bibinitperiod}{}{}{}{}}% {{hash=7cd4c2ad8cb6b9ea774c007fcdd07a1c}{Lee}{L\bibinitperiod}{Insup}{I\bibinitperiod}{}{}{}{}}% } \name{author}{2}{}{% {{hash=ae346f57e0d97f85269d15d46e62ae4b}{Shin}{S\bibinitperiod}{Insik}{I\bibinitperiod}{}{}{}{}}% {{hash=7cd4c2ad8cb6b9ea774c007fcdd07a1c}{Lee}{L\bibinitperiod}{Insup}{I\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {IEEE}% } \strng{namehash}{8a483371c1f53ae56faf709727c7e7b8} \strng{fullhash}{8a483371c1f53ae56faf709727c7e7b8} \field{sortinit}{S} \field{sortinithash}{4125bb4c3a0eb3eaee3ea6da32eb70c8} \field{labeltitle}{Periodic Resource Model for Compositional Real-Time Guarantees} \field{journaltitle}{2003 Proceedings of the 24th IEEE International RTSS} \field{title}{Periodic Resource Model for Compositional Real-Time Guarantees} \field{year}{2003} \endentry \entry{stigge}{book}{} \name{labelname}{1}{}{% {{hash=0076cc326d62e67692fded99c4e4b154}{Stigge}{S\bibinitperiod}{Martin}{M\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=0076cc326d62e67692fded99c4e4b154}{Stigge}{S\bibinitperiod}{Martin}{M\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {Uppsala University}% } \strng{namehash}{0076cc326d62e67692fded99c4e4b154} \strng{fullhash}{0076cc326d62e67692fded99c4e4b154} \field{sortinit}{S} \field{sortinithash}{4125bb4c3a0eb3eaee3ea6da32eb70c8} \field{labeltitle}{Real-Time Workload Models: Expressiveness vs. Analysis Efficiency} \field{isbn}{978-91-554-8888-8} \field{issn}{1104-2516} \field{title}{Real-Time Workload Models: Expressiveness vs. Analysis Efficiency} \field{year}{2014} \endentry \entry{cpp}{book}{} \name{labelname}{1}{}{% {{hash=4975813514faee20fb6fcdb39a08af6f}{Stroustrup}{S\bibinitperiod}{Bjarne}{B\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=4975813514faee20fb6fcdb39a08af6f}{Stroustrup}{S\bibinitperiod}{Bjarne}{B\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {Addison-Wesley}% } \strng{namehash}{4975813514faee20fb6fcdb39a08af6f} \strng{fullhash}{4975813514faee20fb6fcdb39a08af6f} \field{sortinit}{S} \field{sortinithash}{4125bb4c3a0eb3eaee3ea6da32eb70c8} \field{labeltitle}{The C++ Programming Language} \field{edition}{Second Edition} \field{isbn}{0-201-53992-6} \field{title}{The C++ Programming Language} \field{year}{1992} \endentry \entry{unix_intro}{book}{} \name{labelname}{1}{}{% {{hash=4d80a50979ef89bacde251e054f08db1}{Troy}{T\bibinitperiod}{Douglas}{D\bibinitperiod}{}{}{}{}}% } \name{author}{1}{}{% {{hash=4d80a50979ef89bacde251e054f08db1}{Troy}{T\bibinitperiod}{Douglas}{D\bibinitperiod}{}{}{}{}}% } \list{publisher}{1}{% {Addison-Wesley}% } \strng{namehash}{4d80a50979ef89bacde251e054f08db1} \strng{fullhash}{4d80a50979ef89bacde251e054f08db1} \field{sortinit}{T} \field{sortinithash}{9378dd666f3c24d81538df53aa99e23d} \field{labeltitle}{UNIX Systems} \field{isbn}{0-201-19827-4} \field{title}{UNIX Systems} \field{year}{1990} \endentry \entry{heechul2}{inproceedings}{} \name{labelname}{5}{}{% {{hash=908bbec5527d75e9d4d3b600dc4ba92f}{Yun}{Y\bibinitperiod}{Heechul}{H\bibinitperiod}{}{}{}{}}% {{hash=4117253179404561dff236e1ce1b1cab}{Yao}{Y\bibinitperiod}{Gang}{G\bibinitperiod}{}{}{}{}}% {{hash=746d5e8fdee5fd0cb69c23fe2c298940}{Pellizzoni}{P\bibinitperiod}{R.}{R\bibinitperiod}{}{}{}{}}% {{hash=1b3c339a6f66335e0793dc6183906242}{Caccamo}{C\bibinitperiod}{M.}{M\bibinitperiod}{}{}{}{}}% {{hash=6056fb7f4d0d15aa10739704f65482c2}{Sha}{S\bibinitperiod}{Lui}{L\bibinitperiod}{}{}{}{}}% } \name{author}{5}{}{% {{hash=908bbec5527d75e9d4d3b600dc4ba92f}{Yun}{Y\bibinitperiod}{Heechul}{H\bibinitperiod}{}{}{}{}}% {{hash=4117253179404561dff236e1ce1b1cab}{Yao}{Y\bibinitperiod}{Gang}{G\bibinitperiod}{}{}{}{}}% {{hash=746d5e8fdee5fd0cb69c23fe2c298940}{Pellizzoni}{P\bibinitperiod}{R.}{R\bibinitperiod}{}{}{}{}}% {{hash=1b3c339a6f66335e0793dc6183906242}{Caccamo}{C\bibinitperiod}{M.}{M\bibinitperiod}{}{}{}{}}% {{hash=6056fb7f4d0d15aa10739704f65482c2}{Sha}{S\bibinitperiod}{Lui}{L\bibinitperiod}{}{}{}{}}% } \strng{namehash}{ea4fae4020e0a04a84a8963b21f4f0d8} \strng{fullhash}{6b786945067c45c68e1e75f87cae77c4} \field{sortinit}{Y} \field{sortinithash}{29d12db4e709b19996b4b797fbeec132} \field{labeltitle}{Memory Access Control in Multiprocessor for Real-Time Systems with Mixed Criticality} \field{booktitle}{Real-Time Systems (ECRTS) 2012 24th Euromicro Conference} \field{issn}{1068-3070} \field{title}{Memory Access Control in Multiprocessor for Real-Time Systems with Mixed Criticality} \field{year}{2012} \endentry \endsortlist \endrefsection \endinput