{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:11:44Z","timestamp":1760202704535,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T00:00:00Z","timestamp":1443052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF of Fujian province","award":["2014J01221"],"award-info":[{"award-number":["2014J01221"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61402176, 61361136002, 61321064, and 61175123"],"award-info":[{"award-number":["61402176, 61361136002, 61321064, and 61175123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanghai Collaborative Innovation Center of Trustworthy Software for Internet of Things","award":["ZF1213"],"award-info":[{"award-number":["ZF1213"]}]},{"name":"Open Project of Shanghai Key Laboratory of Trustworthy Computing","award":["07dz22304201401"],"award-info":[{"award-number":["07dz22304201401"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2015,12,8]]},"abstract":"<jats:p>The traditional research on scheduling focuses on task scheduling and schedulability analysis in concurrent reactive systems. In this article, we dedicate ourselves to event-based scheduling. We first formally define an event-based scheduling policy and propose the notion of the correctness of a scheduling policy in terms of weak termination. Then we investigate the correctness of the decomposition of scheduling controls and finally obtain a decentralized scheduling method. The method can automatically decompose the scheduling policies of a concurrent reactive system into atomic scheduling policies. Every atomic scheduling policy corresponds to one subsystem. Each of the subsystems is a completely independent system, which may be developed and deployed independently. An experiment demonstrates these results that may help engineers to design correct and efficient schedule policies for a concurrent reactive system.<\/jats:p>","DOI":"10.1145\/2783438","type":"journal-article","created":{"date-parts":[[2015,9,29]],"date-time":"2015-09-29T19:22:29Z","timestamp":1443554549000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Analyzing Event-Based Scheduling in Concurrent Reactive Systems"],"prefix":"10.1145","volume":"14","author":[{"given":"Jian-Min","family":"Jiang","sequence":"first","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Huibiao","family":"Zhu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Qin","family":"Li","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yongxin","family":"Zhao","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Lin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Shi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Ping","family":"Gong","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Zhong","family":"Hong","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2015,9,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/633642.803973"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501626.2501629"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0967-0661(93)92105-D"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.04.001"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.26"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(87)90085-7"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/322374.322380"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2009.5164704"},{"key":"e_1_2_1_9_1","first-page":"42","article-title":"GSM-R network for the high speed line Rome-Naples","volume":"92","author":"Coraiola Alessandro","year":"2000","unstructured":"Alessandro Coraiola and Marko Antscher. 2000. GSM-R network for the high speed line Rome-Naples. Signal and Draht 92, 5, 42--45.","journal-title":"Signal and Draht"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/503271.503226"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_22"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2010.936782"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)00172-F"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359585"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596708"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2011.81"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492248.2492267"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4744-y"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.28"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554929"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189792"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480615"},{"key":"e_1_2_1_24_1","volume-title":"Retrieved","author":"Li Qiao","year":"2012","unstructured":"Qiao Li. 2012. Scheduling in Cyber-Physical Systems. Retrieved February 28, 2015, from http:\/\/repository.cmu.edu\/dissertations\/91."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2176520"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90027-U"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41852"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30469-2_42"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/539036"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90008-4"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"volume-title":"EMISA. LNI","author":"Schmidt Karsten","key":"e_1_2_1_33_1","unstructured":"Karsten Schmidt. 2005. Controllability of open workflow nets. In EMISA. LNI, Bonner Kollen Verlag, 236--249."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/182.358460"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5535-3"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89437-7_6"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.82"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795202"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","unstructured":"Qinghui Tang Sandeep K. S. Gupta and Georgios Varsamopoulos. 2012. A unified methodology for scheduling in distributed cyber-physical systems. ACM Transactions on Embedded Computing Systems\u2014Special Section on CAPA\u201909 Special Section on WHS\u201909 and Special Section VCPSS\u201909 11 S2 Article No. 57. DOI:http:\/\/dx.doi.org\/10.1145\/2331147.2331167 10.1145\/2331147.2331167","DOI":"10.1145\/2331147.2331167"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1995.523257"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.06.014"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2237509"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/218623.218630"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/244795.244801"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2008.52"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2783438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2783438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:14Z","timestamp":1750223234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2783438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,24]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12,8]]}},"alternative-id":["10.1145\/2783438"],"URL":"https:\/\/doi.org\/10.1145\/2783438","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2015,9,24]]},"assertion":[{"value":"2014-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-05-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-09-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}