{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:09Z","timestamp":1742913909622,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150921"},{"type":"electronic","value":"9783030150938"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15093-8_22","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T13:07:46Z","timestamp":1552568866000},"page":"312-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EDF-Based Mixed-Criticality Systems with Weakly-Hard Timing Constraints"],"prefix":"10.1007","author":[{"given":"Hao","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zonghua","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Nenggan","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Vestal, S.: Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In: 28th IEEE International on Real-Time Systems Symposium, RTSS 2007, pp. 239\u2013243. IEEE (2007)","DOI":"10.1109\/RTSS.2007.47"},{"issue":"6","key":"22_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/3131347","volume":"50","author":"A Burns","year":"2017","unstructured":"Burns, A., Davis, R.I.: A survey of research into mixed criticality systems. ACM Comput. Surv. (CSUR) 50(6), 82 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Baruah, S.K., Burns, A., Davis, R.I.: Response-time analysis for mixed criticality systems. In: 2011 IEEE 32nd Real-Time Systems Symposium (RTSS), pp. 34\u201343. IEEE (2011)","DOI":"10.1109\/RTSS.2011.12"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.sysarc.2017.03.007","volume":"83","author":"Q Zhao","year":"2018","unstructured":"Zhao, Q., Gu, Z., Zeng, H., et al.: Schedulability analysis and stack size minimization with preemption thresholds and mixed-criticality scheduling. J. Syst. Arch. 83, 57\u201374 (2018)","journal-title":"J. Syst. Arch."},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.sysarc.2016.08.003","volume":"72","author":"Q Zhao","year":"2017","unstructured":"Zhao, Q., Gu, Z., Zeng, H.: Design optimization for AUTOSAR models with preemption thresholds and mixed-criticality scheduling. J. Syst. Arch. 72, 61\u201368 (2017)","journal-title":"J. Syst. Arch."},{"issue":"4","key":"22_CR6","first-page":"81","volume":"14","author":"Q Zhao","year":"2015","unstructured":"Zhao, Q., Gu, Z., Zeng, H.: Resource synchronization and preemption thresholds within mixed-criticality scheduling. ACM Trans. Embed. Comput. Syst. (TECS) 14(4), 81 (2015)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/LES.2013.2273352","volume":"6","author":"Q Zhao","year":"2014","unstructured":"Zhao, Q., Gu, Z., Zeng, H.: HLC-PCP: a resource synchronization protocol for certifiable mixed criticality scheduling. Embed. Syst. Lett. 6(1), 8\u201311 (2014)","journal-title":"Embed. Syst. Lett."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Baruah, S., Bonifaci, V., DAngelo, G., et al.: The preemptive uniprocessor scheduling of mixed-criticality implicit-deadline sporadic task systems. In: 2012 24th Euromicro Conference on Real-Time Systems (ECRTS), pp. 145\u2013154. IEEE (2012)","DOI":"10.1109\/ECRTS.2012.42"},{"issue":"1","key":"22_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s11241-013-9187-z","volume":"50","author":"P Ekberg","year":"2014","unstructured":"Ekberg, P., Yi, W.: Bounding and shaping the demand of generalized mixed-criticality sporadic task systems. Real-Time Syst. 50(1), 48\u201386 (2014)","journal-title":"Real-Time Syst."},{"key":"22_CR10","unstructured":"Zhang, T., Guan, N., Deng, Q., et al.: On the analysis of EDF-VD scheduled mixed-criticality real-time systems. In: Industrial Embedded Systems (SIES 2014), pp. 179\u2013188 (2014)"},{"issue":"3","key":"22_CR11","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/12.990127","volume":"51","author":"G Buttazzo","year":"2002","unstructured":"Buttazzo, G., Lipari, G., Caccamo, M., Abeni, M.: Elastic scheduling for flexible workload management. IEEE Trans. Comput. 51(3), 289\u2013302 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Su, H., Zhu, D.: An elastic mixed-criticality task model and its scheduling algorithm. In: Proceedings of the Conference on Design, Automation and Test in Europe. EDA Consortium, pp. 147\u2013152 (2013)","DOI":"10.7873\/DATE.2013.043"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Su, H., Guan, N., Zhu, D.: Service guarantee exploration for mixed-criticality systems. In: 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 1\u201310. IEEE (2014)","DOI":"10.1109\/RTCSA.2014.6910499"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Su, H., Deng, P., Zhu, D., et al.: Fixed-priority dual-rate mixed-criticality systems: schedulability analysis and performance optimization. In: Embedded and Real-Time Computing Systems and Applications (RTCSA 2016), pp. 59\u201368 (2016)","DOI":"10.1109\/RTCSA.2016.16"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Gettings, O., Quinton, S., Davis, R.I.: Mixed criticality systems with weakly-hard constraints. In: Proceedings of the 23rd International Conference on Real Time and Networks Systems, pp. 237\u2013246. ACM (2015)","DOI":"10.1145\/2834848.2834850"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Lv, M., Gu, Z., Guan, N., et al.: Performance comparison of techniques on static path analysis of WCET. In: IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, vol. 1, pp. 104\u2013111. IEEE (2008)","DOI":"10.1109\/EUC.2008.178"},{"issue":"1\u20132","key":"22_CR17","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s11241-005-0507-9","volume":"30","author":"E Bini","year":"2005","unstructured":"Bini, E., Buttazzo, G.C.: Measuring the performance of schedulability tests. Real-Time Syst. 30(1\u20132), 129\u2013154 (2005)","journal-title":"Real-Time Syst."}],"container-title":["Lecture Notes in Computer Science","Green, Pervasive, and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15093-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T08:37:01Z","timestamp":1558341421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15093-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150921","9783030150938"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15093-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Green, Pervasive, and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gpc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"101","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.50","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.51","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}