Preemptive Uniprocessor Scheduling of Mixed-Criticality Sporadic Task Systems

Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a subset of its functionality is safety-critical and hence subject to certification; the rest of the functionality is non-safety-critical and doe...

Full description

Saved in:
Bibliographic Details
Published inJournal of the ACM Vol. 62; no. 2; pp. 1 - 33
Main Authors Baruah, Sanjoy, Bonifaci, Vincenzo, D'angelo, Gianlorenzo, Li, Haohan, Marchetti-Spaccamela, Alberto, Van Der Ster, Suzanne, Stougie, Leen
Format Journal Article
LanguageEnglish
Published New York, NY, USA ACM 01.05.2015
Association for Computing Machinery
Subjects
Online AccessGet full text
ISSN0004-5411
1557-735X
1557-735X
DOI10.1145/2699435

Cover

Abstract Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a subset of its functionality is safety-critical and hence subject to certification; the rest of the functionality is non-safety-critical and does not need to be certified, or is certified to lower levels of assurance. The certification-cognizant runtime scheduling of such mixed-criticality systems is considered. An algorithm called EDF-VD (for Earliest Deadline First with Virtual Deadlines) is presented: this algorithm can schedule systems for which any number of criticality levels are defined. Efficient implementations of EDF-VD, as well as associated schedulability tests for determining whether a task system can be correctly scheduled using EDF-VD, are presented. For up to 13 criticality levels, analyses of EDF-VD, based on metrics such as processor speedup factor and utilization bounds, are derived, and conditions under which EDF-VD is optimal with respect to these metrics are identified. Finally, two extensions of EDF-VD are discussed that enhance its applicability. The extensions are aimed at scheduling a wider range of task sets, while preserving the favorable worst-case resource usage guarantees of the basic algorithm.
AbstractList Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a subset of its functionality is safety-critical and hence subject to certification; the rest of the functionality is non-safety-critical and does not need to be certified, or is certified to lower levels of assurance. The certification-cognizant runtime scheduling of such mixed-criticality systems is considered. An algorithm called EDF-VD (for Earliest Deadline First with Virtual Deadlines) is presented: this algorithm can schedule systems for which any number of criticality levels are defined. Efficient implementations of EDF-VD, as well as associated schedulability tests for determining whether a task system can be correctly scheduled using EDF-VD, are presented. For up to 13 criticality levels, analyses of EDF-VD, based on metrics such as processor speedup factor and utilization bounds, are derived, and conditions under which EDF-VD is optimal with respect to these metrics are identified. Finally, two extensions of EDF-VD are discussed that enhance its applicability. The extensions are aimed at scheduling a wider range of task sets, while preserving the favorable worst-case resource usage guarantees of the basic algorithm.
ArticleNumber 14
Author Li, Haohan
D'angelo, Gianlorenzo
Bonifaci, Vincenzo
Stougie, Leen
Baruah, Sanjoy
Van Der Ster, Suzanne
Marchetti-Spaccamela, Alberto
Author_xml – sequence: 1
  givenname: Sanjoy
  surname: Baruah
  fullname: Baruah, Sanjoy
  email: baruah@cs.unc.edu
  organization: University of North Carolina, Chapel Hill, NC
– sequence: 2
  givenname: Vincenzo
  surname: Bonifaci
  fullname: Bonifaci, Vincenzo
  organization: IASI -- Consiglio Nazionale delle Ricerche, Roma, Italy
– sequence: 3
  givenname: Gianlorenzo
  surname: D'angelo
  fullname: D'angelo, Gianlorenzo
  organization: Gran Sasso Science Institute (GSSI), L'Aquila, Italy
– sequence: 4
  givenname: Haohan
  surname: Li
  fullname: Li, Haohan
  organization: University of North Carolina
– sequence: 5
  givenname: Alberto
  surname: Marchetti-Spaccamela
  fullname: Marchetti-Spaccamela, Alberto
  organization: Sapienza Università di Roma, Rome, Italy
– sequence: 6
  givenname: Suzanne
  surname: Van Der Ster
  fullname: Van Der Ster, Suzanne
  organization: Vrije Universiteit Amsterdam, The Netherlands
– sequence: 7
  givenname: Leen
  surname: Stougie
  fullname: Stougie, Leen
  organization: Vrije Universiteit Amsterdam & CWI, The Netherlands
BackLink https://inria.hal.science/hal-01249091$$DView record in HAL
BookMark eNp9kN1rFDEUxYNUcFvFd58GfNA-jN6bmczHY1lqK2xR2BZ8C3ezd2zqzGRMMtX9703daqGIcOFwk18OJ-dQHIxuZCFeIrxDLNV7WbVtWagnYoFK1XldqC8HYgEAZa5KxGfiMISbtIKEeiEuPnvmYYr2lrOr0U7eGQ7B-Wxtrnk793b8mrkuu7A_eZsvvY3WUG_jLltPztPWmuySwrdsvQuRh_BcPO2oD_ziXo_E1YfTy-V5vvp09nF5ssqpqGXMt7VUVbdhJVNQs6EOygYZJAI3EroGuypJq9IQEKY3WG5UY8CU3JiqLo7E273vPE60-0F9rydvB_I7jaDvatD3NST0eI9e0wPkyOrzk5W-OwOUZQst3uKDbarh-8wh6sEGw31PI7s5aGygQSmTJPT1I_TGzX5Mn9ZYNUVdA_ym3uwp410Inrv_xMwfkcZGitaN0ZPt_8G_2vNkhr-mfy5_AbCTm9I
CODEN JACOAH
CitedBy_id crossref_primary_10_3390_computers11070101
crossref_primary_10_1155_2021_3785452
crossref_primary_10_1109_TCAD_2020_2977063
crossref_primary_10_1007_s10479_021_04445_x
crossref_primary_10_1007_s12046_021_01778_y
crossref_primary_10_1016_j_sysarc_2021_102246
crossref_primary_10_1109_TPDS_2017_2677442
crossref_primary_10_1016_j_future_2019_05_022
crossref_primary_10_1109_ACCESS_2022_3143714
crossref_primary_10_1016_j_sysarc_2020_101755
crossref_primary_10_1016_j_sysarc_2019_101688
crossref_primary_10_1109_ACCESS_2021_3066100
crossref_primary_10_1007_s11241_020_09355_y
crossref_primary_10_1109_TC_2018_2882451
crossref_primary_10_1109_ACCESS_2019_2926299
crossref_primary_10_1109_TCAD_2018_2857359
crossref_primary_10_1109_ACCESS_2025_3542472
crossref_primary_10_1145_3105922
crossref_primary_10_1145_3448739
crossref_primary_10_1016_j_sysarc_2021_102090
crossref_primary_10_1109_TC_2022_3197078
crossref_primary_10_1142_S0218126619300071
crossref_primary_10_1155_2017_3403685
crossref_primary_10_1080_17445760_2023_2243420
crossref_primary_10_1109_TC_2018_2789879
crossref_primary_10_3390_s22197528
crossref_primary_10_1016_j_sysarc_2021_102119
crossref_primary_10_1109_TCAD_2017_2697955
crossref_primary_10_1109_TPDS_2019_2907846
crossref_primary_10_1145_3131347
crossref_primary_10_1145_3190837
crossref_primary_10_1080_17445760_2023_2293913
crossref_primary_10_1109_TCAD_2021_3127867
crossref_primary_10_1109_TETC_2021_3072286
crossref_primary_10_1109_TPDS_2021_3118610
crossref_primary_10_1109_TC_2017_2763133
crossref_primary_10_1109_TCAD_2020_3012231
crossref_primary_10_1109_TSUSC_2018_2801123
crossref_primary_10_1109_ACCESS_2020_3031039
Cites_doi 10.1109/RTSS.2011.10
10.1145/1347375.1347389
10.1109/ECRTS.2012.24
10.5555/1009383.1009837
10.1145/321738.321743
10.1109/RTAS.2010.10
10.1007/s11241-013-9187-z
10.1109/RTSS.2007.35
10.1109/TC.2011.142
10.1109/RTSS.2010.18
10.1016/0166-5316(82)90024-4
10.1016/0304-3975(93)90360-6
10.1080/10556780903087124
10.1109/RTSS.2013.16
ContentType Journal Article
Copyright ACM
Copyright Association for Computing Machinery May 2015
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: ACM
– notice: Copyright Association for Computing Machinery May 2015
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
VOOES
ADTOC
UNPAY
DOI 10.1145/2699435
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
CrossRef


Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1557-735X
EndPage 33
ExternalDocumentID oai:iris.uniroma1.it:11573/797898
oai:HAL:hal-01249091v1
3698445921
10_1145_2699435
2699435
Genre Feature
GrantInformation_xml – fundername: Army Research Office
  grantid: W911NF-09-1-0535
  funderid: http://dx.doi.org/10.13039/100000183
– fundername: National Science Foundation
  grantid: CNS 1016954, CNS 1115284, CNS 1218693, CNS 1409175
  funderid: http://dx.doi.org/10.13039/100000001
GroupedDBID --Z
-DZ
-~X
.4S
.DC
29L
3R3
4.4
5GY
5VS
85S
8US
8VB
AAHTB
AAIKC
AAKMM
AALFJ
AAMNW
AAYFX
ABCQX
ABFSI
ABPEJ
ABPPZ
ACGOD
ACM
ACNCT
ADBCU
ADL
ADMLS
ADPZR
AEBYY
AEGXH
AEMOZ
AENEX
AENSD
AFWIH
AFWXC
AGHSJ
AHQJS
AIKLT
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ASPBG
AVWKF
BDXCO
CCLIF
CS3
D0L
DU5
EBE
EBR
EBS
EBU
EDO
EJD
EMK
FEDTE
GUFHI
HGAVV
H~9
I-F
IAO
ICD
IEA
IOF
K1G
L7B
LHSKQ
P1C
PQQKQ
QWB
RNS
TAE
TH9
TN5
UKR
UPT
W7O
WH7
XSW
YIN
YQT
Z5M
ZCA
ZL0
AAYXX
AEFXT
AEJOY
AKRVB
AMVHM
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
.GJ
1XC
41~
9M8
ABUFD
AETEA
AI.
E.L
FA8
HF~
ITC
IVC
MVM
OHT
P-O
ROL
VH1
VOOES
XJT
XOL
ZCG
ZY4
ADTOC
UNPAY
ID FETCH-LOGICAL-a372t-d7256fbe52435cbaf0481e0210e820f81f620f95f95a0a137214b58c0c4e8c673
IEDL.DBID UNPAY
ISSN 0004-5411
1557-735X
IngestDate Sun Oct 26 03:58:08 EDT 2025
Tue Oct 14 20:50:12 EDT 2025
Fri Jul 11 15:19:42 EDT 2025
Mon Jun 30 03:52:51 EDT 2025
Thu Apr 24 22:55:59 EDT 2025
Wed Oct 01 05:56:42 EDT 2025
Fri Feb 21 01:29:13 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords preemptive scheduling
sporadic task system
Mixed criticality
Language English
License Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org
Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
other-oa
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a372t-d7256fbe52435cbaf0481e0210e820f81f620f95f95a0a137214b58c0c4e8c673
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://proxy.k.utb.cz/login?url=http://hdl.handle.net/11573/797898
PQID 1683770080
PQPubID 47580
PageCount 33
ParticipantIDs unpaywall_primary_10_1145_2699435
hal_primary_oai_HAL_hal_01249091v1
proquest_miscellaneous_1808122180
proquest_journals_1683770080
crossref_primary_10_1145_2699435
crossref_citationtrail_10_1145_2699435
acm_primary_2699435
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-05-01
PublicationDateYYYYMMDD 2015-05-01
PublicationDate_xml – month: 05
  year: 2015
  text: 2015-05-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY, USA
PublicationPlace_xml – name: New York, NY, USA
– name: New York
PublicationTitle Journal of the ACM
PublicationTitleAbbrev ACM JACM
PublicationYear 2015
Publisher ACM
Association for Computing Machinery
Publisher_xml – name: ACM
– name: Association for Computing Machinery
References A. Easwaran. 2013. Demand-based scheduling of mixed-criticality sporadic tasks on one processor. In Proceedings of 34th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 78--87. 10.1109/RTSS.2013.16
S. Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In Proceedings of the 28th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 239--243. 10.1109/RTSS.2007.35
C. L. Liu and J. W. Layland. 1973. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM 20, 1, 46--61. 10.1145/321738.321743
K. Albers and F. Slomka. 2004. An event stream driven approximation for the analysis of real-time systems. In Proceedings of the 16th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 187--195. 10.1109/ECRTS.2004.4
J. Barhorst, T. Belote, P. Binns, J. Hoffman, J. Paunicka, P. Sarathy, J. S. P. Stanfill, D. Stuart, and R. Urzi. 2009. A research agenda for mixed-criticality systems. White paper. http://www.cse.wustl.edu/∼cdgill/CPSWEEK09_MCAR/.
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. 2009. Introduction to Algorithms 3rd Ed. MIT Press, Cambridge, MA.
M. L. Dertouzos. 1974. Control robotics: The procedural control of physical processes. In Proceedings of the International Federation for Information Processing Congress. North-Holland, Amsterdam, 807--813.
P. J. Prisaznuk. 1992. Integrated modular avionics. In Proceedings of the IEEE National Aerospace and Electronics Conference, Vol. 1. IEEE, Los Alamitos, CA, 39--45.
R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. B. Whalley, G. Bernat, C. Ferdinand, R. Heckmann, T. Mitra, et al. 2008. The worst-case execution-time problem - overview of methods and survey of tools. ACM Trans. Embedded Comput. Syst. 7, 3, 36. 10.1145/1347375.1347389
P. Ekberg and W. Yi. 2014. Bounding and shaping the demand of generalized mixed-criticality sporadic task systems. Real-Time Systems 50, 1, 48--86. 10.1007/s11241-013-9187-z
J. Y.-T. Leung and J. Whitehead. 1982. On the complexity of fixed-priority scheduling of periodic, real-time tasks. Perf. Eval. 2, 4, 237--250.
A. K. Mok. 1983. Fundamental design problems of distributed systems for the hard real-time environment. Ph.D. dissertation. Laboratory for Computer Science, Massachusetts Institute of Technology. (Available Technical Report No. MIT/LCS/TR-297.)
S. K. Baruah, R. R. Howell, and L. E. Rosier. 1993. Feasibility problems for recurring tasks on one processor. Theor. Comput. Sci. 118, 1, 3--20. 10.1016/0304-3975(93)90360-6
S. Boyd and L. Vandenberghe. 2009. Convex Optimization. Cambridge University Press, Cambridge, UK.
H. Li and S. K. Baruah. 2010. An algorithm for scheduling certifiable mixed-criticality sporadic task systems. In Proceedings of the 31st IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 183--192. 10.1109/RTSS.2010.18
S. K. Baruah, H. Li, and L. Stougie. 2010b. Towards the design of certifiable mixed-criticality systems. In Proceedings of the 16th IEEE Real-Time Technology and Applications Symposium. IEEE, Los Alamitos, CA, 13--22. 10.1109/RTAS.2010.10
A. Burns and R. I. Davis. 2013. Mixed criticality systems - A Review. http://www-users.cs.york.ac.uk/∼burns/review.pdf.
P. Belotti, J. Lee, L. Liberti, F. Margot, and A. Wächter. 2009. Branching and bounds tightening techniques for non-convex MINLP. Optimi. Meth. Softw. 24, 4--5, 597--634. 10.1080/10556780903087124
N. Guan, P. Ekberg, M. Stigge, and W. Yi. 2011. Effective and efficient scheduling of certifiable mixed-criticality sporadic task systems. In Proceedings of the 32nd IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 13--23. 10.1109/RTSS.2011.10
A. K. Mok. 1988. Task management techniques for enforcing ED scheduling on periodic task set. In Proceedings of the 5th IEEE Workshop on Real-Time Software and Operating Systems. USENIX Association, Washington, DC, 42--46.
H. Su and D. Zhu. 2013. An elastic mixed-criticality task model and its scheduling algorithm. In Proceedings of the Conference on Design, Automation & Test in Europe. EDA Consortium, San Jose, CA, 147--152.
S. K. Baruah, H. Li, and L. Stougie. 2010a. Mixed-Criticality scheduling: Improved resource-augmentation results. In Proceedings of the ISCA International Conference on Computers and their Applications. ISCA, Los Alamitos, CA, 217--223.
S. K. Baruah, V. Bonifaci, G. D'Angelo, H. Li, A. Marchetti-Spaccamela, N. Megow, and L. Stougie. 2012. Scheduling real-time mixed-criticality jobs. IEEE Trans. Comput. 61, 8, 1140--1152. 10.1109/TC.2011.142
P. Ekberg and W. Yi. 2012. Bounding and shaping the demand of mixed-criticality sporadic tasks. In Proceedings of 24th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 135--144. 10.1109/ECRTS.2012.24
Prisaznuk P. J. (e_1_2_1_21_1) 1992; 1
Mok A. K. (e_1_2_1_20_1) 1988
e_1_2_1_7_1
e_1_2_1_8_1
e_1_2_1_6_1
e_1_2_1_3_1
e_1_2_1_12_1
e_1_2_1_23_1
e_1_2_1_4_1
Baruah S. K. (e_1_2_1_5_1)
e_1_2_1_13_1
Su H. (e_1_2_1_22_1)
e_1_2_1_24_1
e_1_2_1_1_1
e_1_2_1_10_1
e_1_2_1_2_1
e_1_2_1_16_1
e_1_2_1_17_1
e_1_2_1_14_1
e_1_2_1_15_1
e_1_2_1_9_1
Dertouzos M. L. (e_1_2_1_11_1) 1974
e_1_2_1_18_1
References_xml – reference: K. Albers and F. Slomka. 2004. An event stream driven approximation for the analysis of real-time systems. In Proceedings of the 16th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 187--195. 10.1109/ECRTS.2004.4
– reference: S. K. Baruah, H. Li, and L. Stougie. 2010b. Towards the design of certifiable mixed-criticality systems. In Proceedings of the 16th IEEE Real-Time Technology and Applications Symposium. IEEE, Los Alamitos, CA, 13--22. 10.1109/RTAS.2010.10
– reference: P. Ekberg and W. Yi. 2014. Bounding and shaping the demand of generalized mixed-criticality sporadic task systems. Real-Time Systems 50, 1, 48--86. 10.1007/s11241-013-9187-z
– reference: S. K. Baruah, V. Bonifaci, G. D'Angelo, H. Li, A. Marchetti-Spaccamela, N. Megow, and L. Stougie. 2012. Scheduling real-time mixed-criticality jobs. IEEE Trans. Comput. 61, 8, 1140--1152. 10.1109/TC.2011.142
– reference: C. L. Liu and J. W. Layland. 1973. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM 20, 1, 46--61. 10.1145/321738.321743
– reference: N. Guan, P. Ekberg, M. Stigge, and W. Yi. 2011. Effective and efficient scheduling of certifiable mixed-criticality sporadic task systems. In Proceedings of the 32nd IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 13--23. 10.1109/RTSS.2011.10
– reference: J. Barhorst, T. Belote, P. Binns, J. Hoffman, J. Paunicka, P. Sarathy, J. S. P. Stanfill, D. Stuart, and R. Urzi. 2009. A research agenda for mixed-criticality systems. White paper. http://www.cse.wustl.edu/∼cdgill/CPSWEEK09_MCAR/.
– reference: J. Y.-T. Leung and J. Whitehead. 1982. On the complexity of fixed-priority scheduling of periodic, real-time tasks. Perf. Eval. 2, 4, 237--250.
– reference: S. K. Baruah, R. R. Howell, and L. E. Rosier. 1993. Feasibility problems for recurring tasks on one processor. Theor. Comput. Sci. 118, 1, 3--20. 10.1016/0304-3975(93)90360-6
– reference: P. Ekberg and W. Yi. 2012. Bounding and shaping the demand of mixed-criticality sporadic tasks. In Proceedings of 24th Euromicro Conference on Real-Time Systems. IEEE, Los Alamitos, CA, 135--144. 10.1109/ECRTS.2012.24
– reference: T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. 2009. Introduction to Algorithms 3rd Ed. MIT Press, Cambridge, MA.
– reference: S. Boyd and L. Vandenberghe. 2009. Convex Optimization. Cambridge University Press, Cambridge, UK.
– reference: H. Su and D. Zhu. 2013. An elastic mixed-criticality task model and its scheduling algorithm. In Proceedings of the Conference on Design, Automation & Test in Europe. EDA Consortium, San Jose, CA, 147--152.
– reference: P. Belotti, J. Lee, L. Liberti, F. Margot, and A. Wächter. 2009. Branching and bounds tightening techniques for non-convex MINLP. Optimi. Meth. Softw. 24, 4--5, 597--634. 10.1080/10556780903087124
– reference: A. K. Mok. 1983. Fundamental design problems of distributed systems for the hard real-time environment. Ph.D. dissertation. Laboratory for Computer Science, Massachusetts Institute of Technology. (Available Technical Report No. MIT/LCS/TR-297.)
– reference: S. Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In Proceedings of the 28th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 239--243. 10.1109/RTSS.2007.35
– reference: H. Li and S. K. Baruah. 2010. An algorithm for scheduling certifiable mixed-criticality sporadic task systems. In Proceedings of the 31st IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 183--192. 10.1109/RTSS.2010.18
– reference: M. L. Dertouzos. 1974. Control robotics: The procedural control of physical processes. In Proceedings of the International Federation for Information Processing Congress. North-Holland, Amsterdam, 807--813.
– reference: P. J. Prisaznuk. 1992. Integrated modular avionics. In Proceedings of the IEEE National Aerospace and Electronics Conference, Vol. 1. IEEE, Los Alamitos, CA, 39--45.
– reference: S. K. Baruah, H. Li, and L. Stougie. 2010a. Mixed-Criticality scheduling: Improved resource-augmentation results. In Proceedings of the ISCA International Conference on Computers and their Applications. ISCA, Los Alamitos, CA, 217--223.
– reference: A. Burns and R. I. Davis. 2013. Mixed criticality systems - A Review. http://www-users.cs.york.ac.uk/∼burns/review.pdf.
– reference: A. Easwaran. 2013. Demand-based scheduling of mixed-criticality sporadic tasks on one processor. In Proceedings of 34th IEEE Real-Time Systems Symposium. IEEE, Los Alamitos, CA, 78--87. 10.1109/RTSS.2013.16
– reference: A. K. Mok. 1988. Task management techniques for enforcing ED scheduling on periodic task set. In Proceedings of the 5th IEEE Workshop on Real-Time Software and Operating Systems. USENIX Association, Washington, DC, 42--46.
– reference: R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. B. Whalley, G. Bernat, C. Ferdinand, R. Heckmann, T. Mitra, et al. 2008. The worst-case execution-time problem - overview of methods and survey of tools. ACM Trans. Embedded Comput. Syst. 7, 3, 36. 10.1145/1347375.1347389
– ident: e_1_2_1_15_1
  doi: 10.1109/RTSS.2011.10
– volume-title: Proceedings of the Conference on Design, Automation & Test in Europe. EDA Consortium
  ident: e_1_2_1_22_1
– ident: e_1_2_1_24_1
  doi: 10.1145/1347375.1347389
– ident: e_1_2_1_13_1
  doi: 10.1109/ECRTS.2012.24
– ident: e_1_2_1_1_1
  doi: 10.5555/1009383.1009837
– volume-title: Proceedings of the ISCA International Conference on Computers and their Applications. ISCA
  ident: e_1_2_1_5_1
– ident: e_1_2_1_18_1
  doi: 10.1145/321738.321743
– ident: e_1_2_1_6_1
  doi: 10.1109/RTAS.2010.10
– ident: e_1_2_1_8_1
– ident: e_1_2_1_14_1
  doi: 10.1007/s11241-013-9187-z
– ident: e_1_2_1_2_1
– volume: 1
  volume-title: Proceedings of the IEEE National Aerospace and Electronics Conference
  year: 1992
  ident: e_1_2_1_21_1
– ident: e_1_2_1_23_1
  doi: 10.1109/RTSS.2007.35
– ident: e_1_2_1_3_1
  doi: 10.1109/TC.2011.142
– ident: e_1_2_1_17_1
  doi: 10.1109/RTSS.2010.18
– ident: e_1_2_1_16_1
  doi: 10.1016/0166-5316(82)90024-4
– ident: e_1_2_1_4_1
  doi: 10.1016/0304-3975(93)90360-6
– ident: e_1_2_1_9_1
– ident: e_1_2_1_10_1
– volume-title: Proceedings of the International Federation for Information Processing Congress. North-Holland
  year: 1974
  ident: e_1_2_1_11_1
– ident: e_1_2_1_7_1
  doi: 10.1080/10556780903087124
– ident: e_1_2_1_12_1
  doi: 10.1109/RTSS.2013.16
– volume-title: Proceedings of the 5th IEEE Workshop on Real-Time Software and Operating Systems. USENIX Association
  year: 1988
  ident: e_1_2_1_20_1
SSID ssj0000207
Score 2.4154463
Snippet Systems in many safety-critical application domains are subject to certification requirements. For any given system, however, it may be the case that only a...
SourceID unpaywall
hal
proquest
crossref
acm
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Approximation algorithms analysis
Certification
Computer Science
Computer systems organization
Contextual software domains
Data Structures and Algorithms
Design and analysis of algorithms
Embedded and cyber-physical systems
Information systems
Machine learning theory
Mathematical software
Mathematics of computing
Microprocessors
Online algorithms
Online learning algorithms
Operating systems
Optimization
Preempting
Process management
Real-time systems
Reinforcement learning
Scheduling
Scheduling algorithms
Sequential decision making
Software and its engineering
Software organization and properties
Studies
Task scheduling
Tasks
Theory and algorithms for application domains
Theory of computation
SubjectTermsDisplay Computer systems organization -- Embedded and cyber-physical systems
Computer systems organization -- Real-time systems
Mathematics of computing -- Mathematical software
Software and its engineering -- Software organization and properties -- Contextual software domains -- Operating systems -- Process management -- Scheduling
Theory of computation -- Design and analysis of algorithms -- Approximation algorithms analysis -- Scheduling algorithms
Theory of computation -- Design and analysis of algorithms -- Online algorithms -- Online learning algorithms -- Scheduling algorithms
Theory of computation -- Theory and algorithms for application domains -- Machine learning theory -- Reinforcement learning -- Sequential decision making
Title Preemptive Uniprocessor Scheduling of Mixed-Criticality Sporadic Task Systems
URI https://dl.acm.org/doi/10.1145/2699435
https://www.proquest.com/docview/1683770080
https://www.proquest.com/docview/1808122180
https://inria.hal.science/hal-01249091
http://hdl.handle.net/11573/797898
UnpaywallVersion submittedVersion
Volume 62
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1557-735X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000207
  issn: 0004-5411
  databaseCode: ADMLS
  dateStart: 20040301
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Mathematics Source
  customDbUrl:
  eissn: 1557-735X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000207
  issn: 0004-5411
  databaseCode: AMVHM
  dateStart: 20040301
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fa9swED6a5GF7Wbduo-m6oo2xN7WyLdnyYygrYcylD83InowsybQ0dUKbrO3--t0hO-sPNgYGg3U2wneyvsN33wfwCcMij3KXcCNcxqUVgucpFdNExgijhNeOmpOL43Q8kV-naroBneraI3oBYoJJDjLMdHLdg0GqEG_3YTA5Phn9CLhWciWjQIqqMp4laho6YxHmq4M4zXNJQm49Yy8fbDy9Myp7vIcpn62ahbm7MbPZve3laBMOuyadUFVysb9aVvv211POxn_M_CW8aNElG4VweAUbvtmCzU65gbUL-TUUJ1feXy7oU8cQdS5Ct8CcLM5w76EWdTavWXF-6x3v1BAQrzMSRTfu3LJTc33BWrrzNzA5-nJ6OOatsAI3SRYvucsQ6NSVVzG-HVuZmkhjPGV_HgFBraM6xVOu8ECHRXhPJCulrbDSa5tmyVvoN_PGbwOzytW5TurUOYGZHuJN7bSWssqFMkmsh7CF775cBOqMsvXIED53vihty0VOkhizMvRJqz-GbG3YPeOJyUd05nqU6LLHo28lXROkrI2x-DMawm7n67JdpNdllGJ2nhFmHsKH9TAuL_pnYho_X6ENKZPEiIPIZh0jf5vLzn_YvIPnCLpUKJrchf7yauXfI7BZVnswGBXfx8VeG-G_AfDU8IQ
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Ra9swED6a9GF7Wbduo2m7oY2xN7WyLdnSYygtYSylDw1kT0aWZFqaOqFN1na_fnfIzrqVjYHBYJ2N8J2s7_Dd9wF8wrAwifEZt8IXXDohuMmpmCaxVlglgvbUnDw-zUcT-WWqphvQqa79QS9ATDDZYYGZjtE92MwV4u0-bE5Oz4bfIq6VXMkkkqKqgheZmsbOWIT56jDNjZEk5Naz7vq3jad3QWWPjzDls1WzsA93djZ7tL2cbMFR16QTq0quDlbL6sD9eMrZ-I-Zv4QXLbpkwxgOr2AjNNuw1Sk3sHYhv4bx2U0I1wv61DFEnYvYLTAniwvce6hFnc1rNr68D553agiI1xmJolt_6di5vb1iLd35G5icHJ8fjXgrrMBtVqRL7gsEOnUVVIpvx1W2JtKYQNlfQEBQ66TO8WQUHuiwBO9JZKW0E04G7fIiewv9Zt6EHWBO-drorM69F5jpId7UXmspKyOUzVI9gG189-UiUmeUrUcG8LnzRelaLnKSxJiVsU9a_TJka8PuGU9MPqIz16NElz0afi3pmiBlbYzF78kA9jtfl-0ivS2THLPzgjDzAD6sh3F50T8T24T5Cm1ImSRFHEQ26xj521x2_8NmD54j6FKxaHIf-subVXiHwGZZvW8j-yd0Ze7o
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Preemptive+Uniprocessor+Scheduling+of+Mixed-Criticality+Sporadic+Task+Systems&rft.jtitle=Journal+of+the+ACM&rft.au=Baruah%2C+Sanjoy&rft.au=Bonifaci%2C+Vincenzo&rft.au=d%27Angelo%2C+Gianlorenzo&rft.au=Li%2C+Haohan&rft.date=2015-05-01&rft.pub=Association+for+Computing+Machinery&rft.issn=0004-5411&rft.eissn=1557-735X&rft.volume=62&rft.issue=2&rft_id=info:doi/10.1145%2F2699435&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=oai%3AHAL%3Ahal-01249091v1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0004-5411&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0004-5411&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0004-5411&client=summon