{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T18:43:11Z","timestamp":1770144191383,"version":"3.49.0"},"reference-count":108,"publisher":"Association for Computing Machinery (ACM)","issue":"11s","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,1,31]]},"abstract":"<jats:p>This article surveys existing techniques for meeting the time-bound requirements of time-sensitive applications in the Internet of Things (IoT). To provide the foundation for identifying and classifying relevant techniques, we present three sample time-sensitive IoT applications and their time-bound requirements, describe the main computation and network resources in IoT that can be used to process such applications, and identify the main challenges in meeting their time-bound requirements. Based on these, the article presents a comprehensive literature review of existing techniques and tools that can help meet application-specific time-bound requirements in IoT. The article also includes a gap analysis in existing research outcomes and proposes research directions for bridging the remaining research gaps in supporting time-sensitive IoT applications.<\/jats:p>","DOI":"10.1145\/3510411","type":"journal-article","created":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T20:51:35Z","timestamp":1643403095000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications"],"prefix":"10.1145","volume":"54","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2394-8027","authenticated-orcid":false,"given":"Harindu","family":"Korala","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7880-2140","authenticated-orcid":false,"given":"Dimitrios","family":"Georgakopoulos","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4500-3443","authenticated-orcid":false,"given":"Prem Prakash","family":"Jayaraman","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0588-5931","authenticated-orcid":false,"given":"Ali","family":"Yavari","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-016-0510-0"},{"key":"e_1_3_2_3_2","unstructured":"Gartner. 2017. Forecast: Internet of Things\u2014Endpoints and associated services worldwide 2017. Gartner . Retrieved June 1 2020 from https:\/\/www.gartner.com\/en\/documents\/3840665\/forecast-internet-of-things-endpoints-and-associated-ser."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.91"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3326066"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3204947"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828102"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00031"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.008"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"e_1_3_2_12_2","unstructured":"Queensland Government. 2020. Stopping Distances: Speed and Braking. Retrieved June 1 2020 from https:\/\/www.qld.gov.au\/transport\/safety\/road-safety\/driving-safely\/stopping-distances."},{"key":"e_1_3_2_13_2","unstructured":"Orbbec 3D. n.d. Orbbec Persee. Retrieved June 1 2020 from https:\/\/orbbec3d.com\/product-persee\/."},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.36"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2016.2633287"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.042"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2016.7737202"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651835"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2018.00024"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0081"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8255974"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.EDGE.2017.15"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2851241"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.83"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640024"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.74"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.24"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2508382"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132479.3132490"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700175"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704444"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2714638"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.36"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845499"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389122"},{"key":"e_1_3_2_39_2","volume-title":"Internet of Things Data Contextualisation for Scalable Information Processing, Security, and PrivacyPhD Thesis","author":"Yavari A.","year":"2019","unstructured":"A. Yavari. 2019. Internet of Things Data Contextualisation for Scalable Information Processing, Security, and Privacy. PhD Thesis. School of Science College of Science, Engineering and Health, RMIT University. https:\/\/researchbank.rmit.edu.au\/eserv\/rmit:162757\/Yavari.pdf."},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","unstructured":"R. Mahmud K. Ramamohanarao and R. Buyya. 2020. Application management in fog computing environments: A taxonomy review and future directions. arXiv preprint arXiv:2005.10460 (2020).","DOI":"10.1145\/3403955"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01277643"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.22"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19237-6_17"},{"key":"e_1_3_2_44_2","unstructured":"Apache Storm Foundation. 2020. Apache Storm. Retrieved June 1 2020 from http:\/\/storm.apache.org\/."},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137777"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536229"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987464"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2017.35"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405527"},{"key":"e_1_3_2_51_2","unstructured":"IBM. 2020. Web services architecture overview. IBM . Retrieved June 1 2020 from https:\/\/www.ibm.com\/developerworks\/web\/library\/w-ovr\/."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/2933267.2933317"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.12"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-017-0219-8"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511465"},{"key":"e_1_3_2_56_2","volume-title":"Mobile Information Systems","volume":"2016","author":"Alsaffar A. A.","year":"2016","unstructured":"A. A. Alsaffar, H. P. Pham, C.-S. Hong, E.-N. Huh, and M. Aazam. 2016. An architecture of IoT service delegation and resource allocation based on collaboration between fog and cloud computing. Mobile Information Systems 2016 (2016), Article 6123234."},{"issue":"9","key":"e_1_3_2_57_2","first-page":"24","article-title":"On micro-services architecture","volume":"2","author":"Namiot D.","year":"2014","unstructured":"D. Namiot and M. Sneps-Sneppe. 2014. On micro-services architecture. International Journal of Open Information Technologies 2, 9 (2014), 24\u201327.","journal-title":"International Journal of Open Information Technologies"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2896311"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.124"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2014.54"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2017.27"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/2989275.2989286"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2792940"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094194"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486403"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTA.2016.7562703"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.38"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892508"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.EDGE.2017.10"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4257"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2017.8191055"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2668930.2688055"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134002"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500362"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2019.00033"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2016.10"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647378"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2509"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.012"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2894955"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2701408"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.058"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2018.8491089"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2857726"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.798330"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.018"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2016.7737240"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846644"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8255037"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1071-1"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3190645.3190699"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2896311"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2018.00025"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.17.2816.0109"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.16"},{"issue":"4","key":"e_1_3_2_97_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2893356","article-title":"A survey of techniques for approximate computing","volume":"48","author":"Mittal S.","year":"2016","unstructured":"S. Mittal. 2016. A survey of techniques for approximate computing. ACM Computing Surveys 48, 4 (2016), 1\u201333.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2772896"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2873239"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.49"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIMS.2017.14"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866491"},{"key":"e_1_3_2_103_2","doi-asserted-by":"crossref","unstructured":"R. Mayer L. Graser H. Gupta E. Saurez and U. Ramachandran. 2017. EmuFog: Extensible and scalable emulation of large-scale fog computing infrastructures. arXiv preprint arXiv:1709.07563 (2017).","DOI":"10.1109\/FWC.2017.8368525"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2016.06.008"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEC50012.2020.00011"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/3428690.3429176"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.865"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00100"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00016"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:45Z","timestamp":1750183785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":108,"journal-issue":{"issue":"11s","published-print":{"date-parts":[[2022,1,31]]}},"alternative-id":["10.1145\/3510411"],"URL":"https:\/\/doi.org\/10.1145\/3510411","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"2021-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}