Information Technology Reference
In-Depth Information
Solution 3: minimize the c ðw h Þ
i
(9)
￿
By applying Eq. ( 3 ) that notices:
R ðw h Þ
i
d ðw h Þ
i
f ðw h Þ
i
¼
;
we have
:
R ðw h Þ
i
d ðw h Þ
i
C ðw h Þ
i
:
¼
t
Or, to obtain a feasible system after a recon
guration scenario
ðw h Þ
, the fol-
lowing formula must be enforced:
R ðw h Þ
i
0
:
By this result we can write:
d ðw h Þ
i
C ðw h Þ
t
inew
0
; ð
where C inew is the new worst case execution time value
Þ
Or C ðw h Þ
inew ¼ C ðw h Þ
þ b ðw h Þ
i
:
i
So ; d ðw h Þ
i
t C ðw h Þ
i
b ðw h Þ
i
0
d ðw h Þ
i
C ðw h Þ
i
ðw h Þ
i
)
t
b
ðw h Þ
i
d ðw h Þ
i
C ðw h Þ
i
) b
t
Solution 4: Enforcing the release time to come back:
￿
a ðw h Þ
i
a ðw h Þ
inew
!
ð
where a inew is the new activation time value
Þ
a ðw h Þ
inew
a ðw h Þ
i
þ D
Þ
ð
Þ
¼
t
10
By applying Eq. ( 1 ) that notices:
d ðw h Þ
i
a ðw h Þ
i
D ðw h Þ
i
¼
þ
;
we have:
R ðw h Þ
i
a ðw h Þ
i
D ðw h Þ
i
C ðw h Þ
i
¼
þ
t
:
Or, to obtain a feasible system after a recon
guration scenario
ðw h Þ
, the fol-
lowing formula must be enforced:
R ðw h Þ
i
0
a ðw h Þ
i
D ðw h Þ
i
C ðw h Þ
i
)
þ
t
0
:
Search WWH ::




Custom Search