{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:41:25Z","timestamp":1725396085030},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/emsoft.2013.6658596","type":"proceedings-article","created":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T10:52:14Z","timestamp":1385031134000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Limited preemptive scheduling of non-independent task sets"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Baldovin","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Mezzetti","sequence":"additional","affiliation":[]},{"given":"Tullio","family":"Vardanega","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176520"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/29.5.390"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757922"},{"journal-title":"PowerPC 750 Microprocessor","year":"2013","key":"15"},{"key":"16","article-title":"Preemptive and non-preemptive real-time uniprocessor scheduling","author":"george","year":"1996","journal-title":"Research Report RR-2966 INRIA"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2188805"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2012.57"},{"key":"11","first-page":"225","article-title":"Preemptive priority-based scheduling: An appropriate engineering approach","author":"burns","year":"1994","journal-title":"Advances in Real-Time Systems"},{"key":"12","article-title":"Guide for the use of the ada ravenscar profile in high integrity systems","author":"burns","year":"2003","journal-title":"TR YCS-2003-348"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2392987.2393012"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2011.46"},{"key":"22","article-title":"Attacking the sources of unpredictability in the instruction cache behavior","author":"mezzetti","year":"2008","journal-title":"Proc of the 16th Int Conference on Real-Time and Network Systems (RTNS)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2000.895993"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/12.57058"},{"year":"2012","key":"25"},{"key":"26","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/RTCSA.1999.811269","article-title":"Scheduling fixed-priority tasks with preemption threshold","author":"wang","year":"1999","journal-title":"Real-Time Computing Systems and Applications 1999 RTCSA '99 Sixth International Conference on"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2009.44"},{"key":"28","first-page":"1","article-title":"Comparative evaluation of limited preemptive methods","author":"yao","year":"2010","journal-title":"Emerging Technologies and Factory Automation (ETFA) 2010 IEEE Conference on"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2010.40"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38601-5_10"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00365393"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2007.38"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1755951.1755911"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2011.28"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-010-9113-6"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2010.9"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2049654"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2005.32"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-009-9071-z"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.103"}],"event":{"name":"2013 International \u00a0Conference on Embedded \u00a0Software (EMSOFT)","start":{"date-parts":[[2013,9,29]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 Proceedings of the International Conference on Embedded Software (EMSOFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6648479\/6658572\/06658596.pdf?arnumber=6658596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:53:59Z","timestamp":1498085639000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6658596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/emsoft.2013.6658596","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}