{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:06:43Z","timestamp":1767262003970,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS 18-15891, CNS 18-15959, CNS 19-32529, CNS 20-38817"],"award-info":[{"award-number":["CNS 18-15891, CNS 18-15959, CNS 19-32529, CNS 20-38817"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000003","name":"Boeing Company","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100000003","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Navy","award":["N00014-17-1-2783"],"award-info":[{"award-number":["N00014-17-1-2783"]}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-17-20196,"],"award-info":[{"award-number":["W911NF-17-20196,"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:p>\n            The paper discusses\n            <jats:italic>algorithmic priority inversion<\/jats:italic>\n            in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and describes a solution to mitigate its effect. In general,\n            <jats:italic>priority inversion<\/jats:italic>\n            occurs in computing systems when computations that are \"less important\" are performed together with or ahead of those that are \"more important.\" Significant priority inversion occurs in existing machine inference pipelines when they do not differentiate between critical and less critical data. We describe a framework to resolve this problem and demonstrate that it improves a perception system's ability to react to critical inputs, while at the same time reducing platform cost.\n          <\/jats:p>","DOI":"10.1145\/3610801","type":"journal-article","created":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T16:39:18Z","timestamp":1706200758000},"page":"110-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines"],"prefix":"10.1145","volume":"67","author":[{"given":"Shengzhong","family":"Liu","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Shuochao","family":"Yao","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Xinzhe","family":"Fu","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Rohan","family":"Tabish","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Simon","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Ayoosh","family":"Bansal","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Heechul","family":"Yun","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"given":"Lui","family":"Sha","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Tarek","family":"Abdelzaher","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"https:\/\/www.driverlessguru.com\/self-driving-cars-facts-and-figures","author":"Driverless","year":"2020","unstructured":"Driverless guru. https:\/\/www.driverlessguru.com\/self-driving-cars-facts-and-figures. 2020."},{"key":"e_1_2_1_2_1","first-page":"11","article-title":"Toward an internet of battlefield things: A resilience perspective","volume":"51","author":"Abdelzaher T.","year":"2018","unstructured":"Abdelzaher, T., Ayanian, N., Basar, T., Diggavi, S., Diesner, J., Ganesan, D., et al. Toward an internet of battlefield things: A resilience perspective. Comput. 51, 11 (2018), 24--36.","journal-title":"Comput."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS48715.2020.000-1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02341919"},{"key":"e_1_2_1_5_1","first-page":"1","article-title":"Designed for product delivery","volume":"26","author":"Bamburry D.","year":"2015","unstructured":"Bamburry, D. Drones: Designed for product delivery. Des. Manage. Rev. 26, 1 (2015), 40--48.","journal-title":"Des. Manage. Rev."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759050"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2010.940150"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 2001 Conference on Information Sciences and Systems","author":"Hajek B.","year":"2001","unstructured":"Hajek, B. On the competitiveness of online scheduling of unit-length packets with hard deadlines in slotted time. In Proceedings of the 2001 Conference on Information Sciences and Systems (2001)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_1_11_1","first-page":"166","article-title":"The rate monotonic scheduling algorithm: Exact characterization and average case behavior","volume":"89","author":"Lehoczky J.","year":"1989","unstructured":"Lehoczky, J., Sha, L., Ding, Y. The rate monotonic scheduling algorithm: Exact characterization and average case behavior. RTSS 89 (1989), 166--171.","journal-title":"RTSS"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173191"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_2_1_14_1","volume-title":"Scheduling real-time, periodic jobs using imprecise results","author":"Liu J.W.","year":"1987","unstructured":"Liu, J.W., Lin, K.-J., Natarajan, S. Scheduling real-time, periodic jobs using imprecise results. 1987."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.259428"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3956-8_8"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS49844.2020.00037"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0001-4575(00)00019-1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00252"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00162"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA50079.2020.9203676"},{"key":"e_1_2_1_22_1","first-page":"4","article-title":"Rdeepsense: Reliable deep mobile computing models with uncertainty estimations","volume":"1","author":"Yao S.","year":"2018","unstructured":"Yao, S., Zhao, Y., Shao, H., Zhang, A., Zhang, C., Li, S., et al. Rdeepsense: Reliable deep mobile computing models with uncertainty estimations. Proc. ACM Interact. Mobile Wearable Ubiquitous Technol 1, 4 (2018), 1--26.","journal-title":"Proc. ACM Interact. Mobile Wearable Ubiquitous Technol"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610801","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3610801","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3610801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:11Z","timestamp":1750178231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610801"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,25]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["10.1145\/3610801"],"URL":"https:\/\/doi.org\/10.1145\/3610801","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2024,1,25]]},"assertion":[{"value":"2024-01-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}