{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:56:01Z","timestamp":1762869361195,"version":"build-2065373602"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2024.3404818","type":"journal-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T14:14:11Z","timestamp":1716473651000},"page":"169220-169235","source":"Crossref","is-referenced-by-count":1,"title":["Utilization-Based Safety Aware Scheduling of Mixed-Criticality Real-Time System With Gradual Performance Degradation"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0492-6658","authenticated-orcid":false,"given":"Xinyang","family":"Dong","sequence":"first","affiliation":[{"name":"Northeastern University, Heping, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2994-6110","authenticated-orcid":false,"given":"Wang","family":"Yi","sequence":"additional","affiliation":[{"name":"Northeastern University, Heping, Shenyang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2007.47"},{"volume-title":"Mixed criticality systems\u2014A review","year":"2015","author":"Burns","key":"ref2"},{"volume-title":"Mixed Criticality Systems\u2014A Review","year":"2022","author":"Burns","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2010.10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23719-5_47"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2012.42"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2011.12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2019.00040"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2014.6742877"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2016.013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2015.9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3126498"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3534879.3534895"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2763133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126621503060"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2021.3111743"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2008.52"},{"key":"ref18","first-page":"1","article-title":"On the scheduling of fault-tolerant mixed-criticality systems","volume-title":"Proc. 51st ACM\/EDAC\/IEEE Design Autom. Conf. (DAC)","author":"Huang"},{"key":"ref19","first-page":"43","article-title":"Maximizing the execution rate of low-criticality tasks in mixed criticality systems","volume-title":"Proc. 34th IEEE Real-Time Syst. Symp.","author":"Jan"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1998.739754"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.043"},{"key":"ref22","first-page":"19","article-title":"Supporting graceful degradation through elasticity in mixed-criticality federated scheduling","volume-title":"Proc. 6th Workshop Mixed Criticality Syst. (WMC)","author":"Gill"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2016.16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2019.8864559"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3318512"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/37.710880"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.377333"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2005.1470160"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2008.2010774"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10820123\/10538126.pdf?arnumber=10538126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T17:26:29Z","timestamp":1759512389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10538126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3404818","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}