Claude-Joachim Hamann
Dresden University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Claude-Joachim Hamann.
acm sigops european workshop | 1998
Hermann Härtig; Robert Baumgartl; Martin Borriss; Claude-Joachim Hamann; Micheal Hohmuth; Frank Mehnert; Lars Reuther; Sebastian Schönberg; Jean Wolter
The characterising new requirement for distributed multimedia applications is the coexistence of dynamic real-time and non-real-time applications on hosts and networks. While some networks (e.g., ATM) in principle have the capability to reserve bandwidth on shared links, host systems usually do not. DROPS (Dresden Real-time OPerating System) is being built to remedy that situation by providing resource managers that allow the reservation of resources in advance and enforce that reservations. It allows the coexistence of timesharing applications (with no reservations) and real-time applications (with reservations). By outlining the principle architecture, some design decisions, and first results, the paper demonstrates how these objectives can be met using straightforward OS technology. It argues that middleware for diverse platforms cannot meet these objectives efficiently without proper core operating system support.
real-time systems symposium | 2001
Claude-Joachim Hamann; Jork Löser; Lars Reuther; Sebastian Schönberg; Jean Wolter; Hermann Härtig
We present a unified model for admission and scheduling, applicable for various active resources such as CPU or disk to assure a requested quality in situations of temporary overload. The model allows us to predict and control the behavior of applications based on given quality requirements. It uses the variations in the execution time, i.e., the time any active resource is needed We split resource requirements into a mandatory part which must be available and an optional part which should be available as often as possible but at least with a certain percentage. In combination with a given distribution for the execution time we can move away from worst-case reservations and drastically reduce the amount of reserved resources for applications which can tolerate occasional deadline misses. This increases the number of admittable applications. For example, with negligible loss of quality our system can admit more than two times the disk bandwidth than a system based on the worst-case. Finally, we validated the predictions of our model by measurements using a prototype real-time system and observed a high accuracy between predicted and measured values.
acm symposium on applied computing | 2005
Henrike Berthold; Sven Schmidt; Wolfgang Lehner; Claude-Joachim Hamann
Data stream systems have to deal with massive data volumes. To perform several queries in parallel or to perform even a single query, resources must be planned carefully and the resulting quality-of-service (QoS) is lower than the best one. Typical QoS measures are the output delay and the amount of data in the stream used for the processing. In this paper, we introduce a model which allows to describe stream operators and the streams between the operators of an operator graph belonging to a stream query. The model allows us to calculate the resources consumed by a query graph given a certain result quality. Furthermore, it can be used to determine in advance if the quality-of-service requirement of a given query can be met with the actual available system resources. This model is the basis for building QoS-guaranteeing systems.
computer and communications security | 2008
Marcus Völp; Claude-Joachim Hamann; Hermann Härtig
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simple: we compute at admission time a static predicate that states whether a thread may possibly leak information; if such a thread blocks we switch to the idle thread instead. We describe the modified scheduler, provide a mechanical PVS-based proof of noninterference and show how common admission algorithms can be reused to give real-time guarantees for this modified scheduler. While providing similar isolation guarantees, our approach outperforms time-partitioning schedulers in terms of achieved real-time guarantees.
euromicro conference on real-time systems | 2007
Claude-Joachim Hamann; Michael Roitzsch; Lars Reuther; Jean Wolter; Hermann Härtig
Existing real-time research focuses on how to formulate. model and enforce timeliness guarantees for task sets whose correctness has a temporal aspect. However; the resulting systems often exhibit poor resource utilization due to the resource scheduler reserving more resources than required in order to ensure that admitted schedules can be satisfied under worst case conditions. Weakening the guarantees leads to the known concepts of firm and soft real-time tasks, butt we think the paradigm needs to be shifted further,: reifying efficient utilization. With Quality-Assuring Scheduling (QAS) we presented such an algorithm. However: its practical applicability is restricted to uniform and harmonic periods, due to its complexity for arbitrary periods. To overcome this limitation, we introduce Quality-Rate-Monotonic Scheduling (QRMS), which, although slightly more pessimistic, is less complex compared to QAS. Thee admission control is again based on a probabilistic model to ensure that a requested fraction of jobs is successfully executed. Thus the amount of missed deadlines can be externally controlled, even in sustained overload situations.
real time technology and applications symposium | 2013
Marcus Völp; Benjamin Engel; Claude-Joachim Hamann; Hermann Härtig
Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system. However, rather than exacerbating the problem, we found that considering real-time guarantees actually simplifies the security problem of preventing information leakage over shared-resource covert channels. We introduce a transformation for standard real-time resource locking protocols and show that protocols transformed in this way preserve the confidentiality guarantees of the schedulers on which they are based. Through this transformation, we were able to prove that four out of the seven investigated protocols are information-flow secure.
enterprise distributed object computing | 2006
Claude-Joachim Hamann; Steffen Zschaler
Component-based applications require good middleware support. In particular, business logic should be separated from management code for guaranteeing nonfunctional properties of a system. We present an approach called Container-Managed Quality Assurance, in which a component container uses nonfunctional specifications of components to determine how to use these components, and which system resources to allocate, to provide certain services with guaranteed nonfunctional properties. As an example, we show how this technique can be applied to automatically allocating CPU and memory resources for components with real-time constraints. To this end, we use a mathematical model based on jitterconstrained streams, a mathematical abstraction of event streams.
Archive | 1998
Sebastian Schönberg; Frank Mehnert; Claude-Joachim Hamann; Lars Reuther; Hermann Hrtig
MMB (Kurzvorträge) | 1999
Claude-Joachim Hamann; Lars Reuther
WEIS | 2010
Hermann Härtig; Claude-Joachim Hamann; Michael Roitzsch