Chen, Ya-ShuYa-ShuChenChang, Li-PinLi-PinChangMok, Aloysius K.Aloysius K.MokTEI-WEI KUO2018-09-102018-09-10200901641212http://www.scopus.com/inward/record.url?eid=2-s2.0-55249083007&partnerID=MN8TOARShttp://scholars.lib.ntu.edu.tw/handle/123456789/349853This research responds to practical requirements in the porting of embedded software over platforms and the well-known multiprocessor anomaly. In particular, we consider the task scheduling problem when the system configuration changes. With mutual-exclusive resource accessing, we show that new violations of the timing constraints of tasks might occur even when a more powerful processor or device is adopted. The concept of scheduler stability and rules are then proposed to prevent scheduling anomaly from occurring in task executions that might be involved with task synchronization or I/O access. Finally, we explore policies for bounding the duration of scheduling anomalies. © 2008 Elsevier Inc. All rights reserved.application/pdf719110 bytesapplication/pdfProcess synchronization; Real-time task scheduling; Scheduler stability; Scheduling anomalyInterconnection networks; Multitasking; Scheduling algorithms; System stability; Timing circuits; Embedded softwares; Multi-processors; Process synchronization; Real-time task scheduling; Real-time tasks; Scheduler stability; System configurations; Task executions; Task scheduling problems; Task synchronizations; Timing constraints; SchedulingAn anomaly prevention approach for real-time task schedulingjournal article10.1016/j.jss.2008.07.0382-s2.0-55249083007