{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:08:49Z","timestamp":1755839329634,"version":"3.41.0"},"reference-count":68,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T00:00:00Z","timestamp":1653696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772004"],"award-info":[{"award-number":["61772004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Scientific Research Foundation for Advanced Talents of Chengdu University of Information Technology","award":["KYTZ202009"],"award-info":[{"award-number":["KYTZ202009"]}]},{"name":"Natural Science Foundation of Fujian","award":["2018J01777"],"award-info":[{"award-number":["2018J01777"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2022,5,31]]},"abstract":"<jats:p>\n            To guarantee the safety and security of a real-time mobile system such as an intelligent transportation system, it is necessary to model and analyze its behaviors prior to actual development. In particular, the mobile objects in such systems must be isolated from each other so that they do not collide with each other. Since isolation means two or more mobile objects must not be located in the same place at the same time, a scheduling policy is required to control and coordinate the movement of such objects. However, traditional scheduling theories are based on task scheduling which is coarse-grained and cannot be directly used for fine-grained isolation controls. In this article, we first propose a fine-grained event-based formal model called a\n            <jats:italic>time dependency structure<\/jats:italic>\n            and use it to model and analyze real-time mobile systems. Next, an event-based schedule is defined and the composition of schedules is discussed. Then, we investigate the schedulability of isolation\u2014that is, checking whether a given schedule ensures the isolation relationship among mobile objects or not. After that, we present an automation approach for scheduling generation to guarantee isolation controls in real-time mobile systems. Finally, case studies and simulation experiments demonstrate the usability and effectiveness of our approach.\n          <\/jats:p>","DOI":"10.1145\/3517747","type":"journal-article","created":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T12:19:54Z","timestamp":1653740394000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Scheduling in Real-Time Mobile Systems"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5400-5497","authenticated-orcid":false,"given":"Cong","family":"Chen","sequence":"first","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Shangjie, Minhou, Fuzhou, Fujian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5952-4306","authenticated-orcid":false,"given":"Zhong","family":"Hong","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Shangjie, Minhou, Fuzhou, Fujian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5178-0081","authenticated-orcid":false,"given":"Jian-Min","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Software Engineering, Chengdu University of Information Technology, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,28]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.06.026"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2883817.2883830"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015346419267"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-007-9035-0"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129509990193"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/0967-0661(93)92105-D"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808231"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27755-2_3"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.75415"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791939"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exp036"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375213"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.489073"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053547"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2185632.2185656"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2381453"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2013.6728435"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.11.029"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.2502"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.902622"},{"key":"e_1_3_2_22_2","article-title":"Cyber-physical systems executive summary","volume":"2008","author":"Group CPS Steering","year":"2008","unstructured":"CPS Steering Group et\u00a0al. 2008. Cyber-physical systems executive summary. CPS Summit 2008.","journal-title":"CPS Summit"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2009-0094"},{"key":"e_1_3_2_24_2","first-page":"377","volume-title":"Proceedings of the International Conference on Software: Theory and Practice","author":"Guan Xudong","year":"2000","unstructured":"Xudong Guan, Yiling Yang, and Jinyuan You. 2000. Making ambients more robust. In Proceedings of the International Conference on Software: Theory and Practice. Citeseer, 377\u2013384."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2252901"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6313045"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2492248.2492267"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.28"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783438"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2823353"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780321"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/293677.293681"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2502524.2502530"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189792"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-010-9055-1"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.01.004"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/596980.596981"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2014.980463"},{"key":"e_1_3_2_39_2","unstructured":"Qiao Li. 2012. Scheduling in Cyber-Physical Systems . Dissertation. Carnegie Mellon University. http:\/\/repository.cmu.edu\/dissertations\/91."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2176520"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2629546"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90027-U"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3047412"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503280"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10235-3"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90008-4"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05020-5"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.07.007"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2015.07.003"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2013.09.003"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0898-1221(99)91235-X"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0149607"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2331147.2331167"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45694-5_20"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.341845"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1995.523257"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.06.014"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2237509"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/3477.875448"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3064813"},{"key":"e_1_3_2_63_2","volume-title":"Models for Concurrency","author":"Winskel Glynn","year":"1995","unstructured":"Glynn Winskel and Mogens Nielsen. 1995. Models for Concurrency. Oxford Science Publications, Oxford."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041054"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1166587"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-016-0484-8"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.051"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54233-7_136"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2008.52"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517747","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:04Z","timestamp":1750182544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,28]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5,31]]}},"alternative-id":["10.1145\/3517747"],"URL":"https:\/\/doi.org\/10.1145\/3517747","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2022,5,28]]},"assertion":[{"value":"2021-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}