Lui R. Sha
Software Engineering Institute
Publications by Lui R. Sha
-
Risk Detection and Mitigation Metrics and Design Check Lists for Real Time and Embedded Systems
April 19, 2009 • White Paper
Doug LockeLui R. Sha
A whitepaper by Lui Sha of the University of Illinois and C. Douglass Locke of LC System Services Inc. The paper discusses risk detection and mitigation metrics and design check lists for real time and embedded systems.
read -
Results of SEI Independent Research and Development Projects (FY 2008)
December 01, 2008 • Technical Report
Dionisio de NizGabriel MorenoRobert Nord
This report describes the independent research and development (IRAD) projects that were conducted during fiscal year 2008 (October 2007 through September 2008).
read -
Results of SEI Independent Research and Development Projects (FY 2007)
July 01, 2008 • Technical Report
Len BassLui R. ShaDennis B. Smith
This report describes the independent research and development (IRAD) projects that were conducted during fiscal year 2007 (October 2006 through September 2007).
read -
QUASAR: A Method for the Quality Assessment of Software-Intensive System Architectures
July 01, 2006 • Handbook
Donald FiresmithPeter CapellJoseph P. Elm
This 2006 handbook documents the QUASAR (QUality Assessment of System ARchitectures) method for assessing the quality of the architecture of a software-intensive system.
read -
A Case Study on Analytical Analysis of the Inverted Pendulum Real-Time Control System
November 01, 1999 • Technical Report
Danbing SetoLui R. Sha
An inverted pendulum has been used as the controlled device in a prototype real-time control system employing the Simplex architecture. In this report, we address the control issues of such a system in an analytic way.
read -
Simplex in a Hostile Communications Environment: The Coordinated Prototype
August 01, 1999 • Technical Report
Neal AltmanCharles B. WeinstockLui R. Sha
This report describes an approach to using Simplex to construct a COTS-based computer system capable of coordinated real-time motion control in a hostile communications environment.
read -
An Engineering Method for Safety Region Development
August 01, 1999 • Technical Report
Danbing SetoLui R. Sha
This report studies tolerance of semantic faults, one of the crucial issues in the Simplex architecture.
read -
An Architectural Description of the Simplex Architecture
March 01, 1996 • Technical Report
JoseGermanRiveraAlejandroAndresDanylyszynCharles B. Weinstock
This report describes SEI-developed Simplex, a software architecture for dependable and evolvable process-control systems.
read -
Distributed System Design Using Generalized Rate Monotonic Theory
September 01, 1995 • Technical Report
Lui R. ShaShirishq S. Sathaye
This 1995 paper reviews the rate monotonic scheduling theory, examines the architectural requirements for the use of the theory, and provides an application example.
read -
A Software Architecture for Dependable and Evolvable Industrial Computing Systems
July 01, 1995 • Technical Report
Lui R. Sha
This paper gives a brief overview of the underlying technologies of the Simplex architecture, which was developed to support safe and reliable online upgrade of hardware and software components.
read -
Distributed Real-Time System Design: Theoretical Concepts and Applications
March 01, 1993 • Technical Report
Lui R. ShaShirishq S. Sathaye
This 1993 paper describes the use of generalized rate monotonic scheduling theory for the design and analysis of a distributed real-time system.
read -
Analysis of Reservation-Based Dual-Link Networks
June 01, 1992 • Technical Report
Lui R. ShaShirishq S. SathayeJay K. Strosnider
This report outlines a general model of reservation-based dual-link networks to support real-time communication.
read -
An Application-Level Implementation of the Sporadic Server
September 01, 1991 • Technical Report
Michael Gonzalez HarbourLui R. Sha
The purpose of this paper is to introduce a sporadic server algorithm that can be implemented as an application-level task, and that can be used when no runtime or operating system level implementation of the sporadic server is available.
read -
Rate Monotonic Analysis for Real-Time Systems
March 01, 1991 • Technical Report
Lui R. ShaMark H. KleinJohn B. Goodenough
In this report, we review important decisions in the development of RMA. Our experience indicates that technology transition considerations should be embedded in the process of technology development from the start, rather than as an afterthought.
read -
Implementing Sporadic Servers in ADA
May 01, 1990 • Technical Report
Brinkley SpruntLui R. Sha
This 1990 paper presents the data structures and algorithms for implementing sporadic servers in real-time systems programmed in ADA.
read -
Scheduling Sporadic and Aperiodic Events in a Hard Real-Time System
April 01, 1989 • Technical Report
Brinkley SpruntLui R. ShaJ. Lehoczky
This 1989 report introduces a new algorithm, the Sporadic Server algorithm, which greatly improves response times for soft-deadline aperiodic tasks and can guarantee hard deadlines for both periodic and aperiodic tasks.
read -
Real-Time Scheduling Theory and ADA
April 01, 1989 • Technical Report
Lui R. ShaJohn B. Goodenough
This 1989 report reviews important results of a priority-based scheduling theory and discusses implications for the Ada tasking model.
read -
A Real-Time Locking Protocol
April 01, 1989 • Technical Report
Lui R. ShaRagunathan RajkumarSang Son
This 1989 report examines a priority-driven, two-phase lock protocol called the read- or write-priority ceiling protocol.
read -
Real-Time Scheduling Theory and ADA (1988)
November 01, 1988 • Technical Report
Lui R. ShaJohn B. Goodenough
This 1988 report reviews results of a priority-based scheduling theory, illustrates its applications with examples, discusses its implications for the Ada tasking model, and suggests workarounds.
read -
Mode Change Protocols for Priority-Driven Preemptive Scheduling
November 01, 1988 • Technical Report
Lui R. ShaJohn B. GoodenoughRagunathan Rajkumar
This 1988 report discusses a protocol for accomplishing mode change in the context of a priority-driven preemptive scheduling environment.
read -
The Priority Ceiling Protocol: A Method for Minimizing the Blocking of High-Priority ADA Tasks
March 01, 1988 • Special Report
John B. GoodenoughLui R. Sha
The priority ceiling protocol is a new technique that addresses the priority inversion problem. Under the priority ceiling protocol, a high priority task can be blocked at most once by a lower priority task.
read