Preemptive Uniprocessor Scheduling of Mixed-Criticality Sporadic Task Systems
Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a subset of its functionality is safety-critical and hence subject to certification; the rest of the functionality is non-safety-critical and doe...
        Saved in:
      
    
          | Published in | Journal of the ACM Vol. 62; no. 2; pp. 1 - 33 | 
|---|---|
| Main Authors | , , , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        New York, NY, USA
          ACM
    
        01.05.2015
     Association for Computing Machinery  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0004-5411 1557-735X 1557-735X  | 
| DOI | 10.1145/2699435 | 
Cover
| Abstract | Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a subset of its functionality is safety-critical and hence subject to certification; the rest of the functionality is non-safety-critical and does not need to be certified, or is certified to lower levels of assurance. The certification-cognizant runtime scheduling of such mixed-criticality systems is considered. An algorithm called EDF-VD (for Earliest Deadline First with Virtual Deadlines) is presented: this algorithm can schedule systems for which any number of criticality levels are defined. Efficient implementations of EDF-VD, as well as associated schedulability tests for determining whether a task system can be correctly scheduled using EDF-VD, are presented. For up to 13 criticality levels, analyses of EDF-VD, based on metrics such as processor speedup factor and utilization bounds, are derived, and conditions under which EDF-VD is optimal with respect to these metrics are identified. Finally, two extensions of EDF-VD are discussed that enhance its applicability. The extensions are aimed at scheduling a wider range of task sets, while preserving the favorable worst-case resource usage guarantees of the basic algorithm. | 
    
|---|---|
| AbstractList | Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a subset of its functionality is safety-critical and hence subject to certification; the rest of the functionality is non-safety-critical and does not need to be certified, or is certified to lower levels of assurance. The certification-cognizant runtime scheduling of such mixed-criticality systems is considered. An algorithm called EDF-VD (for Earliest Deadline First with Virtual Deadlines) is presented: this algorithm can schedule systems for which any number of criticality levels are defined. Efficient implementations of EDF-VD, as well as associated schedulability tests for determining whether a task system can be correctly scheduled using EDF-VD, are presented. For up to 13 criticality levels, analyses of EDF-VD, based on metrics such as processor speedup factor and utilization bounds, are derived, and conditions under which EDF-VD is optimal with respect to these metrics are identified. Finally, two extensions of EDF-VD are discussed that enhance its applicability. The extensions are aimed at scheduling a wider range of task sets, while preserving the favorable worst-case resource usage guarantees of the basic algorithm. | 
    
| ArticleNumber | 14 | 
    
| Author | Li, Haohan D'angelo, Gianlorenzo Bonifaci, Vincenzo Stougie, Leen Baruah, Sanjoy Van Der Ster, Suzanne Marchetti-Spaccamela, Alberto  | 
    
| Author_xml | – sequence: 1 givenname: Sanjoy surname: Baruah fullname: Baruah, Sanjoy email: baruah@cs.unc.edu organization: University of North Carolina, Chapel Hill, NC – sequence: 2 givenname: Vincenzo surname: Bonifaci fullname: Bonifaci, Vincenzo organization: IASI -- Consiglio Nazionale delle Ricerche, Roma, Italy – sequence: 3 givenname: Gianlorenzo surname: D'angelo fullname: D'angelo, Gianlorenzo organization: Gran Sasso Science Institute (GSSI), L'Aquila, Italy – sequence: 4 givenname: Haohan surname: Li fullname: Li, Haohan organization: University of North Carolina – sequence: 5 givenname: Alberto surname: Marchetti-Spaccamela fullname: Marchetti-Spaccamela, Alberto organization: Sapienza Università di Roma, Rome, Italy – sequence: 6 givenname: Suzanne surname: Van Der Ster fullname: Van Der Ster, Suzanne organization: Vrije Universiteit Amsterdam, The Netherlands – sequence: 7 givenname: Leen surname: Stougie fullname: Stougie, Leen organization: Vrije Universiteit Amsterdam & CWI, The Netherlands  | 
    
| BackLink | https://inria.hal.science/hal-01249091$$DView record in HAL | 
    
| BookMark | eNp9kN1rFDEUxYNUcFvFd58GfNA-jN6bmczHY1lqK2xR2BZ8C3ezd2zqzGRMMtX9703daqGIcOFwk18OJ-dQHIxuZCFeIrxDLNV7WbVtWagnYoFK1XldqC8HYgEAZa5KxGfiMISbtIKEeiEuPnvmYYr2lrOr0U7eGQ7B-Wxtrnk793b8mrkuu7A_eZsvvY3WUG_jLltPztPWmuySwrdsvQuRh_BcPO2oD_ziXo_E1YfTy-V5vvp09nF5ssqpqGXMt7VUVbdhJVNQs6EOygYZJAI3EroGuypJq9IQEKY3WG5UY8CU3JiqLo7E273vPE60-0F9rydvB_I7jaDvatD3NST0eI9e0wPkyOrzk5W-OwOUZQst3uKDbarh-8wh6sEGw31PI7s5aGygQSmTJPT1I_TGzX5Mn9ZYNUVdA_ym3uwp410Inrv_xMwfkcZGitaN0ZPt_8G_2vNkhr-mfy5_AbCTm9I | 
    
| CODEN | JACOAH | 
    
| CitedBy_id | crossref_primary_10_3390_computers11070101 crossref_primary_10_1155_2021_3785452 crossref_primary_10_1109_TCAD_2020_2977063 crossref_primary_10_1007_s10479_021_04445_x crossref_primary_10_1007_s12046_021_01778_y crossref_primary_10_1016_j_sysarc_2021_102246 crossref_primary_10_1109_TPDS_2017_2677442 crossref_primary_10_1016_j_future_2019_05_022 crossref_primary_10_1109_ACCESS_2022_3143714 crossref_primary_10_1016_j_sysarc_2020_101755 crossref_primary_10_1016_j_sysarc_2019_101688 crossref_primary_10_1109_ACCESS_2021_3066100 crossref_primary_10_1007_s11241_020_09355_y crossref_primary_10_1109_TC_2018_2882451 crossref_primary_10_1109_ACCESS_2019_2926299 crossref_primary_10_1109_TCAD_2018_2857359 crossref_primary_10_1109_ACCESS_2025_3542472 crossref_primary_10_1145_3105922 crossref_primary_10_1145_3448739 crossref_primary_10_1016_j_sysarc_2021_102090 crossref_primary_10_1109_TC_2022_3197078 crossref_primary_10_1142_S0218126619300071 crossref_primary_10_1155_2017_3403685 crossref_primary_10_1080_17445760_2023_2243420 crossref_primary_10_1109_TC_2018_2789879 crossref_primary_10_3390_s22197528 crossref_primary_10_1016_j_sysarc_2021_102119 crossref_primary_10_1109_TCAD_2017_2697955 crossref_primary_10_1109_TPDS_2019_2907846 crossref_primary_10_1145_3131347 crossref_primary_10_1145_3190837 crossref_primary_10_1080_17445760_2023_2293913 crossref_primary_10_1109_TCAD_2021_3127867 crossref_primary_10_1109_TETC_2021_3072286 crossref_primary_10_1109_TPDS_2021_3118610 crossref_primary_10_1109_TC_2017_2763133 crossref_primary_10_1109_TCAD_2020_3012231 crossref_primary_10_1109_TSUSC_2018_2801123 crossref_primary_10_1109_ACCESS_2020_3031039  | 
    
| Cites_doi | 10.1109/RTSS.2011.10 10.1145/1347375.1347389 10.1109/ECRTS.2012.24 10.5555/1009383.1009837 10.1145/321738.321743 10.1109/RTAS.2010.10 10.1007/s11241-013-9187-z 10.1109/RTSS.2007.35 10.1109/TC.2011.142 10.1109/RTSS.2010.18 10.1016/0166-5316(82)90024-4 10.1016/0304-3975(93)90360-6 10.1080/10556780903087124 10.1109/RTSS.2013.16  | 
    
| ContentType | Journal Article | 
    
| Copyright | ACM Copyright Association for Computing Machinery May 2015 Distributed under a Creative Commons Attribution 4.0 International License  | 
    
| Copyright_xml | – notice: ACM – notice: Copyright Association for Computing Machinery May 2015 – notice: Distributed under a Creative Commons Attribution 4.0 International License  | 
    
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 1XC VOOES ADTOC UNPAY  | 
    
| DOI | 10.1145/2699435 | 
    
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Computer and Information Systems Abstracts CrossRef Computer and Information Systems Abstracts  | 
    
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISSN | 1557-735X | 
    
| EndPage | 33 | 
    
| ExternalDocumentID | oai:iris.uniroma1.it:11573/797898 oai:HAL:hal-01249091v1 3698445921 10_1145_2699435 2699435  | 
    
| Genre | Feature | 
    
| GrantInformation_xml | – fundername: Army Research Office grantid: W911NF-09-1-0535 funderid: http://dx.doi.org/10.13039/100000183 – fundername: National Science Foundation grantid: CNS 1016954, CNS 1115284, CNS 1218693, CNS 1409175 funderid: http://dx.doi.org/10.13039/100000001  | 
    
| GroupedDBID | --Z -DZ -~X .4S .DC 29L 3R3 4.4 5GY 5VS 85S 8US 8VB AAHTB AAIKC AAKMM AALFJ AAMNW AAYFX ABCQX ABFSI ABPEJ ABPPZ ACGOD ACM ACNCT ADBCU ADL ADMLS ADPZR AEBYY AEGXH AEMOZ AENEX AENSD AFWIH AFWXC AGHSJ AHQJS AIKLT AKVCP ALMA_UNASSIGNED_HOLDINGS ASPBG AVWKF BDXCO CCLIF CS3 D0L DU5 EBE EBR EBS EBU EDO EJD EMK FEDTE GUFHI HGAVV H~9 I-F IAO ICD IEA IOF K1G L7B LHSKQ P1C PQQKQ QWB RNS TAE TH9 TN5 UKR UPT W7O WH7 XSW YIN YQT Z5M ZCA ZL0 AAYXX AEFXT AEJOY AKRVB AMVHM CITATION 7SC 8FD JQ2 L7M L~C L~D .GJ 1XC 41~ 9M8 ABUFD AETEA AI. E.L FA8 HF~ ITC IVC MVM OHT P-O ROL VH1 VOOES XJT XOL ZCG ZY4 ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-a372t-d7256fbe52435cbaf0481e0210e820f81f620f95f95a0a137214b58c0c4e8c673 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 0004-5411 1557-735X  | 
    
| IngestDate | Sun Oct 26 03:58:08 EDT 2025 Tue Oct 14 20:50:12 EDT 2025 Fri Jul 11 15:19:42 EDT 2025 Mon Jun 30 03:52:51 EDT 2025 Thu Apr 24 22:55:59 EDT 2025 Wed Oct 01 05:56:42 EDT 2025 Fri Feb 21 01:29:13 EST 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2 | 
    
| Keywords | preemptive scheduling sporadic task system Mixed criticality  | 
    
| Language | English | 
    
| License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 other-oa  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-a372t-d7256fbe52435cbaf0481e0210e820f81f620f95f95a0a137214b58c0c4e8c673 | 
    
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23  | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://hdl.handle.net/11573/797898 | 
    
| PQID | 1683770080 | 
    
| PQPubID | 47580 | 
    
| PageCount | 33 | 
    
| ParticipantIDs | unpaywall_primary_10_1145_2699435 hal_primary_oai_HAL_hal_01249091v1 proquest_miscellaneous_1808122180 proquest_journals_1683770080 crossref_primary_10_1145_2699435 crossref_citationtrail_10_1145_2699435 acm_primary_2699435  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2015-05-01 | 
    
| PublicationDateYYYYMMDD | 2015-05-01 | 
    
| PublicationDate_xml | – month: 05 year: 2015 text: 2015-05-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | New York, NY, USA | 
    
| PublicationPlace_xml | – name: New York, NY, USA – name: New York  | 
    
| PublicationTitle | Journal of the ACM | 
    
| PublicationTitleAbbrev | ACM JACM | 
    
| PublicationYear | 2015 | 
    
| Publisher | ACM Association for Computing Machinery  | 
    
| Publisher_xml | – name: ACM – name: Association for Computing Machinery  | 
    
| References | A. Easwaran. 2013. Demand-based scheduling of mixed-criticality sporadic tasks on one processor. In Proceedings of 34th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 78--87. 10.1109/RTSS.2013.16 S. Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In Proceedings of the 28th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 239--243. 10.1109/RTSS.2007.35 C. L. Liu and J. W. Layland. 1973. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM 20, 1, 46--61. 10.1145/321738.321743 K. Albers and F. Slomka. 2004. An event stream driven approximation for the analysis of real-time systems. In Proceedings of the 16th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 187--195. 10.1109/ECRTS.2004.4 J. Barhorst, T. Belote, P. Binns, J. Hoffman, J. Paunicka, P. Sarathy, J. S. P. Stanfill, D. Stuart, and R. Urzi. 2009. A research agenda for mixed-criticality systems. White paper. http://www.cse.wustl.edu/∼cdgill/CPSWEEK09_MCAR/. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. 2009. Introduction to Algorithms 3rd Ed. MIT Press, Cambridge, MA. M. L. Dertouzos. 1974. Control robotics: The procedural control of physical processes. In Proceedings of the International Federation for Information Processing Congress. North-Holland, Amsterdam, 807--813. P. J. Prisaznuk. 1992. Integrated modular avionics. In Proceedings of the IEEE National Aerospace and Electronics Conference, Vol. 1. IEEE, Los Alamitos, CA, 39--45. R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. B. Whalley, G. Bernat, C. Ferdinand, R. Heckmann, T. Mitra, et al. 2008. The worst-case execution-time problem - overview of methods and survey of tools. ACM Trans. Embedded Comput. Syst. 7, 3, 36. 10.1145/1347375.1347389 P. Ekberg and W. Yi. 2014. Bounding and shaping the demand of generalized mixed-criticality sporadic task systems. Real-Time Systems 50, 1, 48--86. 10.1007/s11241-013-9187-z J. Y.-T. Leung and J. Whitehead. 1982. On the complexity of fixed-priority scheduling of periodic, real-time tasks. Perf. Eval. 2, 4, 237--250. A. K. Mok. 1983. Fundamental design problems of distributed systems for the hard real-time environment. Ph.D. dissertation. Laboratory for Computer Science, Massachusetts Institute of Technology. (Available Technical Report No. MIT/LCS/TR-297.) S. K. Baruah, R. R. Howell, and L. E. Rosier. 1993. Feasibility problems for recurring tasks on one processor. Theor. Comput. Sci. 118, 1, 3--20. 10.1016/0304-3975(93)90360-6 S. Boyd and L. Vandenberghe. 2009. Convex Optimization. Cambridge University Press, Cambridge, UK. H. Li and S. K. Baruah. 2010. An algorithm for scheduling certifiable mixed-criticality sporadic task systems. In Proceedings of the 31st IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 183--192. 10.1109/RTSS.2010.18 S. K. Baruah, H. Li, and L. Stougie. 2010b. Towards the design of certifiable mixed-criticality systems. In Proceedings of the 16th IEEE Real-Time Technology and Applications Symposium. IEEE, Los Alamitos, CA, 13--22. 10.1109/RTAS.2010.10 A. Burns and R. I. Davis. 2013. Mixed criticality systems - A Review. http://www-users.cs.york.ac.uk/∼burns/review.pdf. P. Belotti, J. Lee, L. Liberti, F. Margot, and A. Wächter. 2009. Branching and bounds tightening techniques for non-convex MINLP. Optimi. Meth. Softw. 24, 4--5, 597--634. 10.1080/10556780903087124 N. Guan, P. Ekberg, M. Stigge, and W. Yi. 2011. Effective and efficient scheduling of certifiable mixed-criticality sporadic task systems. In Proceedings of the 32nd IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 13--23. 10.1109/RTSS.2011.10 A. K. Mok. 1988. Task management techniques for enforcing ED scheduling on periodic task set. In Proceedings of the 5th IEEE Workshop on Real-Time Software and Operating Systems. USENIX Association, Washington, DC, 42--46. H. Su and D. Zhu. 2013. An elastic mixed-criticality task model and its scheduling algorithm. In Proceedings of the Conference on Design, Automation & Test in Europe. EDA Consortium, San Jose, CA, 147--152. S. K. Baruah, H. Li, and L. Stougie. 2010a. Mixed-Criticality scheduling: Improved resource-augmentation results. In Proceedings of the ISCA International Conference on Computers and their Applications. ISCA, Los Alamitos, CA, 217--223. S. K. Baruah, V. Bonifaci, G. D'Angelo, H. Li, A. Marchetti-Spaccamela, N. Megow, and L. Stougie. 2012. Scheduling real-time mixed-criticality jobs. IEEE Trans. Comput. 61, 8, 1140--1152. 10.1109/TC.2011.142 P. Ekberg and W. Yi. 2012. Bounding and shaping the demand of mixed-criticality sporadic tasks. In Proceedings of 24th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 135--144. 10.1109/ECRTS.2012.24 Prisaznuk P. J. (e_1_2_1_21_1) 1992; 1 Mok A. K. (e_1_2_1_20_1) 1988 e_1_2_1_7_1 e_1_2_1_8_1 e_1_2_1_6_1 e_1_2_1_3_1 e_1_2_1_12_1 e_1_2_1_23_1 e_1_2_1_4_1 Baruah S. K. (e_1_2_1_5_1) e_1_2_1_13_1 Su H. (e_1_2_1_22_1) e_1_2_1_24_1 e_1_2_1_1_1 e_1_2_1_10_1 e_1_2_1_2_1 e_1_2_1_16_1 e_1_2_1_17_1 e_1_2_1_14_1 e_1_2_1_15_1 e_1_2_1_9_1 Dertouzos M. L. (e_1_2_1_11_1) 1974 e_1_2_1_18_1  | 
    
| References_xml | – reference: K. Albers and F. Slomka. 2004. An event stream driven approximation for the analysis of real-time systems. In Proceedings of the 16th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 187--195. 10.1109/ECRTS.2004.4 – reference: S. K. Baruah, H. Li, and L. Stougie. 2010b. Towards the design of certifiable mixed-criticality systems. In Proceedings of the 16th IEEE Real-Time Technology and Applications Symposium. IEEE, Los Alamitos, CA, 13--22. 10.1109/RTAS.2010.10 – reference: P. Ekberg and W. Yi. 2014. Bounding and shaping the demand of generalized mixed-criticality sporadic task systems. Real-Time Systems 50, 1, 48--86. 10.1007/s11241-013-9187-z – reference: S. K. Baruah, V. Bonifaci, G. D'Angelo, H. Li, A. Marchetti-Spaccamela, N. Megow, and L. Stougie. 2012. Scheduling real-time mixed-criticality jobs. IEEE Trans. Comput. 61, 8, 1140--1152. 10.1109/TC.2011.142 – reference: C. L. Liu and J. W. Layland. 1973. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM 20, 1, 46--61. 10.1145/321738.321743 – reference: N. Guan, P. Ekberg, M. Stigge, and W. Yi. 2011. Effective and efficient scheduling of certifiable mixed-criticality sporadic task systems. In Proceedings of the 32nd IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 13--23. 10.1109/RTSS.2011.10 – reference: J. Barhorst, T. Belote, P. Binns, J. Hoffman, J. Paunicka, P. Sarathy, J. S. P. Stanfill, D. Stuart, and R. Urzi. 2009. A research agenda for mixed-criticality systems. White paper. http://www.cse.wustl.edu/∼cdgill/CPSWEEK09_MCAR/. – reference: J. Y.-T. Leung and J. Whitehead. 1982. On the complexity of fixed-priority scheduling of periodic, real-time tasks. Perf. Eval. 2, 4, 237--250. – reference: S. K. Baruah, R. R. Howell, and L. E. Rosier. 1993. Feasibility problems for recurring tasks on one processor. Theor. Comput. Sci. 118, 1, 3--20. 10.1016/0304-3975(93)90360-6 – reference: P. Ekberg and W. Yi. 2012. Bounding and shaping the demand of mixed-criticality sporadic tasks. In Proceedings of 24th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 135--144. 10.1109/ECRTS.2012.24 – reference: T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. 2009. Introduction to Algorithms 3rd Ed. MIT Press, Cambridge, MA. – reference: S. Boyd and L. Vandenberghe. 2009. Convex Optimization. Cambridge University Press, Cambridge, UK. – reference: H. Su and D. Zhu. 2013. An elastic mixed-criticality task model and its scheduling algorithm. In Proceedings of the Conference on Design, Automation & Test in Europe. EDA Consortium, San Jose, CA, 147--152. – reference: P. Belotti, J. Lee, L. Liberti, F. Margot, and A. Wächter. 2009. Branching and bounds tightening techniques for non-convex MINLP. Optimi. Meth. Softw. 24, 4--5, 597--634. 10.1080/10556780903087124 – reference: A. K. Mok. 1983. Fundamental design problems of distributed systems for the hard real-time environment. Ph.D. dissertation. Laboratory for Computer Science, Massachusetts Institute of Technology. (Available Technical Report No. MIT/LCS/TR-297.) – reference: S. Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In Proceedings of the 28th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 239--243. 10.1109/RTSS.2007.35 – reference: H. Li and S. K. Baruah. 2010. An algorithm for scheduling certifiable mixed-criticality sporadic task systems. In Proceedings of the 31st IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 183--192. 10.1109/RTSS.2010.18 – reference: M. L. Dertouzos. 1974. Control robotics: The procedural control of physical processes. In Proceedings of the International Federation for Information Processing Congress. North-Holland, Amsterdam, 807--813. – reference: P. J. Prisaznuk. 1992. Integrated modular avionics. In Proceedings of the IEEE National Aerospace and Electronics Conference, Vol. 1. IEEE, Los Alamitos, CA, 39--45. – reference: S. K. Baruah, H. Li, and L. Stougie. 2010a. Mixed-Criticality scheduling: Improved resource-augmentation results. In Proceedings of the ISCA International Conference on Computers and their Applications. ISCA, Los Alamitos, CA, 217--223. – reference: A. Burns and R. I. Davis. 2013. Mixed criticality systems - A Review. http://www-users.cs.york.ac.uk/∼burns/review.pdf. – reference: A. Easwaran. 2013. Demand-based scheduling of mixed-criticality sporadic tasks on one processor. In Proceedings of 34th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 78--87. 10.1109/RTSS.2013.16 – reference: A. K. Mok. 1988. Task management techniques for enforcing ED scheduling on periodic task set. In Proceedings of the 5th IEEE Workshop on Real-Time Software and Operating Systems. USENIX Association, Washington, DC, 42--46. – reference: R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. B. Whalley, G. Bernat, C. Ferdinand, R. Heckmann, T. Mitra, et al. 2008. The worst-case execution-time problem - overview of methods and survey of tools. ACM Trans. Embedded Comput. Syst. 7, 3, 36. 10.1145/1347375.1347389 – ident: e_1_2_1_15_1 doi: 10.1109/RTSS.2011.10 – volume-title: Proceedings of the Conference on Design, Automation & Test in Europe. EDA Consortium ident: e_1_2_1_22_1 – ident: e_1_2_1_24_1 doi: 10.1145/1347375.1347389 – ident: e_1_2_1_13_1 doi: 10.1109/ECRTS.2012.24 – ident: e_1_2_1_1_1 doi: 10.5555/1009383.1009837 – volume-title: Proceedings of the ISCA International Conference on Computers and their Applications. ISCA ident: e_1_2_1_5_1 – ident: e_1_2_1_18_1 doi: 10.1145/321738.321743 – ident: e_1_2_1_6_1 doi: 10.1109/RTAS.2010.10 – ident: e_1_2_1_8_1 – ident: e_1_2_1_14_1 doi: 10.1007/s11241-013-9187-z – ident: e_1_2_1_2_1 – volume: 1 volume-title: Proceedings of the IEEE National Aerospace and Electronics Conference year: 1992 ident: e_1_2_1_21_1 – ident: e_1_2_1_23_1 doi: 10.1109/RTSS.2007.35 – ident: e_1_2_1_3_1 doi: 10.1109/TC.2011.142 – ident: e_1_2_1_17_1 doi: 10.1109/RTSS.2010.18 – ident: e_1_2_1_16_1 doi: 10.1016/0166-5316(82)90024-4 – ident: e_1_2_1_4_1 doi: 10.1016/0304-3975(93)90360-6 – ident: e_1_2_1_9_1 – ident: e_1_2_1_10_1 – volume-title: Proceedings of the International Federation for Information Processing Congress. North-Holland year: 1974 ident: e_1_2_1_11_1 – ident: e_1_2_1_7_1 doi: 10.1080/10556780903087124 – ident: e_1_2_1_12_1 doi: 10.1109/RTSS.2013.16 – volume-title: Proceedings of the 5th IEEE Workshop on Real-Time Software and Operating Systems. USENIX Association year: 1988 ident: e_1_2_1_20_1  | 
    
| SSID | ssj0000207 | 
    
| Score | 2.4154463 | 
    
| Snippet | Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a... | 
    
| SourceID | unpaywall hal proquest crossref acm  | 
    
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 1 | 
    
| SubjectTerms | Algorithms Approximation algorithms analysis Certification Computer Science Computer systems organization Contextual software domains Data Structures and Algorithms Design and analysis of algorithms Embedded and cyber-physical systems Information systems Machine learning theory Mathematical software Mathematics of computing Microprocessors Online algorithms Online learning algorithms Operating systems Optimization Preempting Process management Real-time systems Reinforcement learning Scheduling Scheduling algorithms Sequential decision making Software and its engineering Software organization and properties Studies Task scheduling Tasks Theory and algorithms for application domains Theory of computation  | 
    
| SubjectTermsDisplay | Computer systems organization -- Embedded and cyber-physical systems Computer systems organization -- Real-time systems Mathematics of computing -- Mathematical software Software and its engineering -- Software organization and properties -- Contextual software domains -- Operating systems -- Process management -- Scheduling Theory of computation -- Design and analysis of algorithms -- Approximation algorithms analysis -- Scheduling algorithms Theory of computation -- Design and analysis of algorithms -- Online algorithms -- Online learning algorithms -- Scheduling algorithms Theory of computation -- Theory and algorithms for application domains -- Machine learning theory -- Reinforcement learning -- Sequential decision making  | 
    
| Title | Preemptive Uniprocessor Scheduling of Mixed-Criticality Sporadic Task Systems | 
    
| URI | https://dl.acm.org/doi/10.1145/2699435 https://www.proquest.com/docview/1683770080 https://www.proquest.com/docview/1808122180 https://inria.hal.science/hal-01249091 http://hdl.handle.net/11573/797898  | 
    
| UnpaywallVersion | submittedVersion | 
    
| Volume | 62 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1557-735X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000207 issn: 0004-5411 databaseCode: ADMLS dateStart: 20040301 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVEBS databaseName: Mathematics Source customDbUrl: eissn: 1557-735X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000207 issn: 0004-5411 databaseCode: AMVHM dateStart: 20040301 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fa9swED6a5GF7Wbduo-m6oo2xN7WyLdnyYygrYcylD83InowsybQ0dUKbrO3--t0hO-sPNgYGg3U2wneyvsN33wfwCcMij3KXcCNcxqUVgucpFdNExgijhNeOmpOL43Q8kV-naroBneraI3oBYoJJDjLMdHLdg0GqEG_3YTA5Phn9CLhWciWjQIqqMp4laho6YxHmq4M4zXNJQm49Yy8fbDy9Myp7vIcpn62ahbm7MbPZve3laBMOuyadUFVysb9aVvv211POxn_M_CW8aNElG4VweAUbvtmCzU65gbUL-TUUJ1feXy7oU8cQdS5Ct8CcLM5w76EWdTavWXF-6x3v1BAQrzMSRTfu3LJTc33BWrrzNzA5-nJ6OOatsAI3SRYvucsQ6NSVVzG-HVuZmkhjPGV_HgFBraM6xVOu8ECHRXhPJCulrbDSa5tmyVvoN_PGbwOzytW5TurUOYGZHuJN7bSWssqFMkmsh7CF775cBOqMsvXIED53vihty0VOkhizMvRJqz-GbG3YPeOJyUd05nqU6LLHo28lXROkrI2x-DMawm7n67JdpNdllGJ2nhFmHsKH9TAuL_pnYho_X6ENKZPEiIPIZh0jf5vLzn_YvIPnCLpUKJrchf7yauXfI7BZVnswGBXfx8VeG-G_AfDU8IQ | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Ra9swED6a9GF7Wbduo2m7oY2xN7WyLdnSYygtYSylDw1kT0aWZFqaOqFN1na_fnfIzrqVjYHBYJ2N8J2s7_Dd9wF8wrAwifEZt8IXXDohuMmpmCaxVlglgvbUnDw-zUcT-WWqphvQqa79QS9ATDDZYYGZjtE92MwV4u0-bE5Oz4bfIq6VXMkkkqKqgheZmsbOWIT56jDNjZEk5Naz7vq3jad3QWWPjzDls1WzsA93djZ7tL2cbMFR16QTq0quDlbL6sD9eMrZ-I-Zv4QXLbpkwxgOr2AjNNuw1Sk3sHYhv4bx2U0I1wv61DFEnYvYLTAniwvce6hFnc1rNr68D553agiI1xmJolt_6di5vb1iLd35G5icHJ8fjXgrrMBtVqRL7gsEOnUVVIpvx1W2JtKYQNlfQEBQ66TO8WQUHuiwBO9JZKW0E04G7fIiewv9Zt6EHWBO-drorM69F5jpId7UXmspKyOUzVI9gG189-UiUmeUrUcG8LnzRelaLnKSxJiVsU9a_TJka8PuGU9MPqIz16NElz0afi3pmiBlbYzF78kA9jtfl-0ivS2THLPzgjDzAD6sh3F50T8T24T5Cm1ImSRFHEQ26xj521x2_8NmD54j6FKxaHIf-subVXiHwGZZvW8j-yd0Ze7o | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Preemptive+Uniprocessor+Scheduling+of+Mixed-Criticality+Sporadic+Task+Systems&rft.jtitle=Journal+of+the+ACM&rft.au=Baruah%2C+Sanjoy&rft.au=Bonifaci%2C+Vincenzo&rft.au=d%27Angelo%2C+Gianlorenzo&rft.au=Li%2C+Haohan&rft.date=2015-05-01&rft.pub=Association+for+Computing+Machinery&rft.issn=0004-5411&rft.eissn=1557-735X&rft.volume=62&rft.issue=2&rft_id=info:doi/10.1145%2F2699435&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=oai%3AHAL%3Ahal-01249091v1 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0004-5411&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0004-5411&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0004-5411&client=summon |