Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Lui R. Sha
April 2009 - White Paper Risk Detection and Mitigation Metrics and Design Check Lists for Real Time and Embedded Systems

Authors: Doug Locke, Lui R. Sha

A whitepaper by Lui Sha of the University of Illinois and C. Douglass Locke of LC System Services Inc. The paper discusses risk detection and mitigation metrics and design check lists for real time and embedded systems.

December 2008 - Technical Report Results of SEI Independent Research and Development Projects (FY 2008)

Authors: Dionisio de Niz, Gabriel Moreno, Robert Nord, Ipek Ozkaya, Daniel Plakosh, Ragunathan Rajkumar, Lui R. Sha, Robert W. Stoddard, Kurt C. Wallnau, Charles B. Weinstock, Lutz Wrage, Sherman Eagles, Peter H. Feiler, John B. Goodenough, Jörgen Hansson, Paul Jones, Rick Kazman, Mark H. Klein, Insup Lee

This report describes the independent research and development (IRAD) projects that were conducted during fiscal year 2008 (October 2007 through September 2008).

July 2008 - Technical Report Results of SEI Independent Research and Development Projects (FY 2007)

Topics: Acquisition Support, Software Architecture

Authors: Len Bass, Lui R. Sha, Dennis B. Smith, Kurt C. Wallnau, Jörgen Hansson (University of Skovde), John J. Hudak, Dionisio de Niz, Peter H. Feiler, Donald Firesmith, Mark H. Klein, Kostas Kontogiannis, Grace Lewis, Marin Litoiu (IBM Canada Ltd.), Stefan Schuster

This report describes the independent research and development (IRAD) projects that were conducted during fiscal year 2007 (October 2006 through September 2007).

July 2006 - Handbook QUASAR: A Method for the Quality Assessment of Software-Intensive System Architectures

Topics: Acquisition Support

Authors: Donald Firesmith, Peter Capell, Joseph P. Elm, Michael J. Gagliardi, Timothy Morrow, Linda Roush (Naval Air Systems Command, U.S. Navy), Lui R. Sha

This 2006 handbook documents the QUASAR (QUality Assessment of System ARchitectures) method for assessing the quality of the architecture of a software-intensive system.

November 1999 - Technical Report A Case Study on Analytical Analysis of the Inverted Pendulum Real-Time Control System

Topics: Performance and Dependability

Authors: Danbing Seto, Lui R. Sha

An inverted pendulum has been used as the controlled device in a prototype real-time control system employing the Simplex architecture. In this report, we address the control issues of such a system in an analytic way.

August 1999 - Technical Report Simplex in a Hostile Communications Environment: The Coordinated Prototype

Topics: Performance and Dependability

Authors: Neal Altman, Charles B. Weinstock, Lui R. Sha, Danbing Seto

This report describes an approach to using Simplex to construct a COTS-based computer system capable of coordinated real-time motion control in a hostile communications environment.

August 1999 - Technical Report An Engineering Method for Safety Region Development

Authors: Danbing Seto, Lui R. Sha

This report studies tolerance of semantic faults, one of the crucial issues in the Simplex architecture.

March 1996 - Technical Report An Architectural Description of the Simplex Architecture

Topics: Acquisition Support, Performance and Dependability, Software Architecture

Authors: JoseGermanRivera, AlejandroAndresDanylyszyn, Charles B. Weinstock, Lui R. Sha, Michael J. Gagliardi

This report describes SEI-developed Simplex, a software architecture for dependable and evolvable process-control systems.

September 1995 - Technical Report Distributed System Design Using Generalized Rate Monotonic Theory

Topics: Performance and Dependability

Authors: Lui R. Sha, Shirishq S. Sathaye

This 1995 paper reviews the rate monotonic scheduling theory, examines the architectural requirements for the use of the theory, and provides an application example.

July 1995 - Technical Report A Software Architecture for Dependable and Evolvable Industrial Computing Systems

Topics: Software Architecture

Authors: Lui R. Sha

This paper gives a brief overview of the underlying technologies of the Simplex architecture, which was developed to support safe and reliable online upgrade of hardware and software components.

March 1993 - Technical Report Distributed Real-Time System Design: Theoretical Concepts and Applications

Topics: Performance and Dependability

Authors: Lui R. Sha, Shirishq S. Sathaye

This 1993 paper describes the use of generalized rate monotonic scheduling theory for the design and analysis of a distributed real-time system.

June 1992 - Technical Report Analysis of Reservation-Based Dual-Link Networks

Authors: Lui R. Sha, Shirishq S. Sathaye, Jay K. Strosnider

This report outlines a general model of reservation-based dual-link networks to support real-time communication.

September 1991 - Technical Report An Application-Level Implementation of the Sporadic Server

Topics: Performance and Dependability

Authors: Michael Gonzalez Harbour, Lui R. Sha

The purpose of this paper is to introduce a sporadic server algorithm that can be implemented as an application-level task, and that can be used when no runtime or operating system level implementation of the sporadic server is available.

March 1991 - Technical Report Rate Monotonic Analysis for Real-Time Systems

Topics: Performance and Dependability

Authors: Lui R. Sha, Mark H. Klein, John B. Goodenough

In this report, we review important decisions in the development of RMA. Our experience indicates that technology transition considerations should be embedded in the process of technology development from the start, rather than as an afterthought.

May 1990 - Technical Report Implementing Sporadic Servers in ADA

Topics: Performance and Dependability

Authors: Brinkley Sprunt, Lui R. Sha

This 1990 paper presents the data structures and algorithms for implementing sporadic servers in real-time systems programmed in ADA.

April 1989 - Technical Report Scheduling Sporadic and Aperiodic Events in a Hard Real-Time System

Topics: Performance and Dependability

Authors: Brinkley Sprunt, Lui R. Sha, J. Lehoczky

This 1989 report introduces a new algorithm, the Sporadic Server algorithm, which greatly improves response times for soft-deadline aperiodic tasks and can guarantee hard deadlines for both periodic and aperiodic tasks.

April 1989 - Technical Report Real-Time Scheduling Theory and ADA

Topics: Performance and Dependability

Authors: Lui R. Sha, John B. Goodenough

This 1989 report reviews important results of a priority-based scheduling theory and discusses implications for the Ada tasking model.

April 1989 - Technical Report A Real-Time Locking Protocol

Topics: Performance and Dependability

Authors: Lui R. Sha, Ragunathan Rajkumar, Sang Son, Chang Chun-Hyon

This 1989 report examines a priority-driven,two-phase lock protocol called the read- or write-priority ceiling protocol.

November 1988 - Technical Report Real-Time Scheduling Theory and ADA (1988)

Topics: Performance and Dependability

Authors: Lui R. Sha, John B. Goodenough

This 1988 report reviews results of a priority-based scheduling theory, illustrates its applications with examples, discusses its implications for the Ada tasking model, and suggests workarounds.

November 1988 - Technical Report Mode Change Protocols for Priority-Driven Preemptive Scheduling

Topics: Performance and Dependability

Authors: Lui R. Sha, John B. Goodenough, Ragunathan Rajkumar, Krithi Ramamritham, J. Lehoczky

This 1988 report discusses a protocol for accomplishing mode change in the context of a priority-driven preemptive scheduling environment.

March 1988 - Special Report The Priority Ceiling Protocol: A Method for Minimizing the Blocking of High-Priority ADA Tasks

Topics: Performance and Dependability

Authors: John B. Goodenough, Lui R. Sha

The priority ceiling protocol is a new technique that addresses the priority inversion problem. Under the priority ceiling protocol, a high priority task can be blocked at most once by a lower priority task.