{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T02:13:12Z","timestamp":1775182392887,"version":"3.50.1"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:00:00Z","timestamp":1704844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Swedish Research Council (VR) with the project \u201cPervasive Self-Optimizing Computing Infrastructures (PSI)\u201d","award":["2020-05094"],"award-info":[{"award-number":["2020-05094"]}]},{"name":"Knowledge Foundation (KKS) with the project \u201cSafe and Secure Adaptive Collaborative Systems (SACSys)\u201d","award":["20190021"],"award-info":[{"award-number":["20190021"]}]},{"name":"\u201cFederated Choreography of an Integrated Embedded Systems Software Architecture (FIESTA)\u201d and \u201cExcellence in Production Research (XPRES)\u201d"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>Container-based virtualization is a promising deployment model in fog and edge computing applications, because it allows a seamless co-existence of virtualized applications in a heterogeneous environment without introducing significant overhead. Certain application domains (e.g., industrial automation, automotive, or aerospace) mandate that applications exhibit a certain degree of temporal predictability. Container-based virtualization cannot be easily used for such applications, since the technology is not designed to support real-time properties and handle temporal disturbances. This article proposes a framework consisting of a static offline and a dynamic online phase for resource allocation and adaptive re-dimensioning of real-time containers. In the offline phase, the optimal initial deployment and dimensioning of containers are decided based on ideal system models. Additionally, to adapt to dynamic variations caused by changing workloads or interferences, the online phase adapts the CPU usage and limits of real-time containers at runtime to improve the real-time behavior of the real-time containerized applications while optimizing resource usage. We implement the framework in a real Linux-based system and show through a series of experiments that the proposed framework is able to adjust and re-distribute computing resources between containers to improve the real-time behavior of containerized applications in the presence of temporal disturbances while optimizing resource usage.<\/jats:p>","DOI":"10.1145\/3592856","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T12:25:39Z","timestamp":1682425539000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Hierarchical Resource Orchestration Framework for Real-time Containers"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0705-6766","authenticated-orcid":false,"given":"V\u00e1clav","family":"Struh\u00e1r","sequence":"first","affiliation":[{"name":"M\u00e4lardalen University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0116-9265","authenticated-orcid":false,"given":"Silviu S.","family":"Craciunas","sequence":"additional","affiliation":[{"name":"TTTech Computertechnik AG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3469-1834","authenticated-orcid":false,"given":"Mohammad","family":"Ashjaei","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1687-930X","authenticated-orcid":false,"given":"Moris","family":"Behnam","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1364-8127","authenticated-orcid":false,"given":"Alessandro V.","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,1,10]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373400.3373405"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102733"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1023\/b:time.0000027934.77900.22"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2724942.2724945"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/cloud.2017.67"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/1017753.1017772"},{"key":"e_1_3_2_8_2","volume-title":"Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW\u201921)","author":"Barletta Marco","year":"2021","unstructured":"Marco Barletta, Marcello Cinque, and Raffaele Della Corte. 2021. Hierarchical scheduling for real-time containers in mixed-criticality systems. In Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW\u201921)."},{"key":"e_1_3_2_9_2","volume-title":"Proceedings of the 34th Euromicro Conference on Real-Time Systems (ECRTS\u201922)","author":"Barletta Marco","year":"2022","unstructured":"Marco Barletta, Marcello Cinque, Luigi De Simone, and Raffaele Della Corte. 2022. Achieving isolation in mixed-criticality industrial edge systems with real-time containers. In Proceedings of the 34th Euromicro Conference on Real-Time Systems (ECRTS\u201922). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2205.14188"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-22110-1_14","volume-title":"Computer Aided Verification","author":"Barrett Clark","year":"2011","unstructured":"Clark Barrett, Christopher L. Conway, Morgan Deters, Liana Hadarean, Dejan Jovanovi\u0107, Tim King, Andrew Reynolds, and Cesare Tinelli. 2011. CVC4. In Computer Aided Verification, Ganesh Gopalakrishnan and Shaz Qadeer (Eds.). Springer, Berlin, 171\u2013177."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8_11"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_14"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12002-2_12"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_7"},{"key":"e_1_3_2_16_2","volume-title":"Proceedings of the 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W\u201918)","author":"Cinque Marcello","year":"2018","unstructured":"Marcello Cinque and Domenico Cotroneo. 2018. Towards lightweight temporal and fault isolation in mixed-criticality systems with real-time containers. In Proceedings of the 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W\u201918)."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.12.002"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECRTS.2019.5"},{"key":"e_1_3_2_19_2","volume-title":"Approximation Algorithms for Bin Packing: A Survey","author":"Coffman E. G.","year":"1996","unstructured":"E. G. Coffman, M. R. Garey, and D. S. Johnson. 1996. Approximation Algorithms for Bin Packing: A Survey."},{"key":"e_1_3_2_20_2","unstructured":"Computer Science Laboratory\u2013SRI International. [n.d.]. The Yices SMT Solver. Retrieved from http:\/\/yices.csl.sri.com\/. on 4-Jan-2023."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-015-9244-x"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2021.3116183"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507216"},{"issue":"4","key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"190","DOI":"10.3390\/info13040190","article-title":"Performance evaluation of distributed database strategies using Docker as a service for industrial IoT data: Application to industry 4.0","volume":"13","author":"Gkamas Theodosios","year":"2022","unstructured":"Theodosios Gkamas, Vasileios Karaiskos, and Sotirios Kontogiannis. 2022. Performance evaluation of distributed database strategies using Docker as a service for industrial IoT data: Application to industry 4.0. Information 13, 4 (2022), 190.","journal-title":"Information"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2018.03.002"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-319-08867-9_2","volume-title":"Computer Aided Verification","author":"Komuravelli Anvesh","year":"2014","unstructured":"Anvesh Komuravelli, Arie Gurfinkel, and Sagar Chaki. 2014. SMT-based model checking for recursive programs. In Computer Aided Verification, Armin Biere and Roderick Bloem (Eds.). Springer International Publishing, Cham, 17\u201334."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-014-0334-4"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/EMRTS.2003.1212738"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/b978-155860702-6\/50016-8"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851737"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755938"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403274"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-015-9224-1"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_22"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/cloud.2019.00061"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313150.3313225"},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/978-3-642-19835-9_34","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Seshia Sanjit A.","year":"2011","unstructured":"Sanjit A. Seshia and Jonathan Kotker. 2011. GameTime: A toolkit for timing analysis of software. In Tools and Algorithms for the Construction and Analysis of Systems, Parosh Aziz Abdulla and K. Rustan M. Leino (Eds.). Springer, Berlin, 388\u2013392."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/etfa46521.2020.9211887"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/cloud.2018.00018"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2003.1253249"},{"issue":"5","key":"e_1_3_2_43_2","doi-asserted-by":"crossref","first-page":"3566","DOI":"10.1109\/TII.2020.3022843","article-title":"Evaluating docker for lightweight virtualization of distributed and time-sensitive applications in industrial automation","volume":"17","author":"Sollfrank Michael","year":"2020","unstructured":"Michael Sollfrank, Frieder Loch, Steef Denteneer, and Birgit Vogel-Heuser. 2020. Evaluating docker for lightweight virtualization of distributed and time-sensitive applications in industrial automation. IEEE Trans. Industrial Inform. 17, 5 (2020), 3566\u20133576.","journal-title":"IEEE Trans. Industrial Inform."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.4230\/OASIcs.Fog-IoT.2020.7"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/etfa45728.2021.9613685"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2018.00076"},{"issue":"1","key":"e_1_3_2_47_2","first-page":"221","article-title":"The SMT competition 2015-2018","volume":"11","author":"Weber Tjark","year":"2019","unstructured":"Tjark Weber, Sylvain Conchon, David D\u00e9harbe, Matthias Heizmann, Aina Niemetz, and Giles Reger. 2019. The SMT competition 2015-2018. J. Satisf. Boolean Model. Comput. 11, 1 (2019), 221\u2013259.","journal-title":"J. Satisf. Boolean Model. Comput."},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.3390\/computers9030071"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,10]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3592856"],"URL":"https:\/\/doi.org\/10.1145\/3592856","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,10]]},"assertion":[{"value":"2022-11-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}