{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:04:31Z","timestamp":1771049071030,"version":"3.50.1"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:00:00Z","timestamp":1704844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of Fujian Province of China NSFFJ NoURL","award":["2023J01139 NSFFJ"],"award-info":[{"award-number":["2023J01139 NSFFJ"]}]},{"name":"Fundamental Research Funds for the Central Universities FRFCU NoURL","award":["ZQN-1009 FRFCU"],"award-info":[{"award-number":["ZQN-1009 FRFCU"]}]},{"name":"Swedish Research Council VR NoURL","award":["2023-04485 VR"],"award-info":[{"award-number":["2023-04485 VR"]}]},{"DOI":"10.13039\/100016756","name":"Kempe Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016756","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>The classic Mixed-Criticality System (MCS) task model is a non-clairvoyance model in which the change of the system behavior is based on the completion of high-criticality tasks while dropping low-criticality tasks in high-criticality mode. In this paper, we simultaneously consider graceful degradation and semi-clairvoyance in MCS. We first propose the analysis for adaptive mixed-criticality with semi-clairvoyance denoted as C-AMC-sem. The so-called semi-clairvoyance refers to the system\u2019s behavior change being revealed at the time that jobs are released. Moreover, we propose a new algorithm based on C-AMC-sem to reduce energy consumption. Finally, we verify the performance of the proposed algorithms via experiments upon synthetically generated tasksets. The experimental results indicate that the proposed algorithms significantly outperform the existing algorithms.<\/jats:p>","DOI":"10.1145\/3632749","type":"journal-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T11:45:51Z","timestamp":1699875951000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Energy-Aware Adaptive Mixed-Criticality Scheduling with Semi-Clairvoyance and Graceful Degradation"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0522-0454","authenticated-orcid":false,"given":"Yi-Wen","family":"Zhang","sequence":"first","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9755-5363","authenticated-orcid":false,"given":"Hui","family":"Zheng","sequence":"additional","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4228-2774","authenticated-orcid":false,"given":"Zonghua","family":"Gu","sequence":"additional","affiliation":[{"name":"Ume\u00e5 University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,1,10]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/RTSS46320.2019.00047","volume-title":"2019 IEEE Real-Time Systems Symposium (RTSS)","author":"Agrawal Kunal","year":"2019","unstructured":"Kunal Agrawal, Sanjoy Baruah, and Alan Burns. 2019. Semi-clairvoyance in mixed-criticality scheduling. In 2019 IEEE Real-Time Systems Symposium (RTSS). IEEE, 458\u2013468."},{"key":"e_1_3_2_3_2","first-page":"438","volume-title":"2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing","author":"Ali Ijaz","year":"2015","unstructured":"Ijaz Ali, Jun-ho Seo, and Kyong Hoon Kim. 2015. A dynamic power-aware scheduling of mixed-criticality real-time systems. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, 438\u2013445."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0034"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00165-4"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2012.42"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/ECRTS.2016.12","volume-title":"2016 28th Euromicro Conference on Real-Time Systems (ECRTS)","author":"Baruah Sanjoy","year":"2016","unstructured":"Sanjoy Baruah, Alan Burns, and Zhishan Guo. 2016. Scheduling mixed-criticality systems to guarantee some service under all non-erroneous behaviors. In 2016 28th Euromicro Conference on Real-Time Systems (ECRTS). IEEE, 131\u2013138."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECRTS.2021.9"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/RTSS.2011.12","volume-title":"2011 IEEE 32nd Real-Time Systems Symposium","author":"Baruah Sanjoy K.","year":"2011","unstructured":"Sanjoy K. Baruah, Alan Burns, and Robert I. Davis. 2011. Response-time analysis for mixed criticality systems. In 2011 IEEE 32nd Real-Time Systems Symposium. IEEE Computer Society, 34\u201343."},{"key":"e_1_3_2_10_2","first-page":"33","article-title":"Cache-related preemption and migration delays: Empirical approximation and impact on schedulability","volume":"10","author":"Bastoni Andrea","year":"2010","unstructured":"Andrea Bastoni, Bj\u00f6rn Brandenburg, and James Anderson. 2010. Cache-related preemption and migration delays: Empirical approximation and impact on schedulability. Proceedings of OSPERT 10 (2010), 33\u201344.","journal-title":"Proceedings of OSPERT"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3356401.3356410"},{"key":"e_1_3_2_12_2","volume-title":"Work-in-Progress Session of the 16th Euromicro Conference on Real-Time Systems","author":"Bril Reinder J.","year":"2004","unstructured":"Reinder J. Bril, Wim F. J. Verhaegh, and Johan J. Lukkien. 2004. Exact worst-case response times of real-time tasks under fixed-priority scheduling with deferred preemption. In Work-in-Progress Session of the 16th Euromicro Conference on Real-Time Systems."},{"key":"e_1_3_2_13_2","volume-title":"Workshop on Mixed-Criticality Systems (colocated with RTSS)","author":"Burns Alan","year":"2013","unstructured":"Alan Burns and Sanjoy Baruah. 2013. Towards a more practical model for mixed criticality systems. In Workshop on Mixed-Criticality Systems (colocated with RTSS)."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/RTSS49844.2020.00013","volume-title":"2020 IEEE Real-Time Systems Symposium (RTSS)","author":"Burns Alan","year":"2020","unstructured":"Alan Burns and Robert I. Davis. 2020. Schedulability analysis for adaptive mixed criticality systems with arbitrary deadlines and semi-clairvoyance. In 2020 IEEE Real-Time Systems Symposium (RTSS). IEEE, 12\u201324."},{"key":"e_1_3_2_15_2","article-title":"Mixed criticality systems-A review: (13th Edition)","author":"Burns Alan","year":"2022","unstructured":"Alan Burns and Robert Ian Davis. 2022. Mixed criticality systems-A review: (13th Edition). Available at Department of Computer Science, University of York, Tech. Rep (2022). https:\/\/eprints.whiterose.ac.uk\/183619\/","journal-title":"Available at Department of Computer Science, University of York, Tech. Rep"},{"key":"e_1_3_2_16_2","first-page":"111","volume-title":"2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906)","author":"Calandrino John M.","year":"2006","unstructured":"John M. Calandrino, Hennadiy Leontyev, Aaron Block, UmaMaheswari C. Devi, and James H. Anderson. 2006. Litmus \\(^{\\textrm {rt}}\\) : A testbed for empirically comparing real-time multiprocessor schedulers. In 2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906). IEEE, 111\u2013126."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534879.3534881"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534879.3534895"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-018-9308-9"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/RTSS49844.2020.00018","volume-title":"2020 IEEE Real-Time Systems Symposium (RTSS)","author":"Griffin David","year":"2020","unstructured":"David Griffin, Iain Bate, and Robert I. Davis. 2020. Generating utilization vectors for the systematic evaluation of schedulability tests. In 2020 IEEE Real-Time Systems Symposium (RTSS). IEEE, 76\u201388."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2017.06.008"},{"key":"e_1_3_2_22_2","first-page":"373","volume-title":"2018 IEEE Real-Time Systems Symposium (RTSS)","author":"Guo Zhishan","year":"2018","unstructured":"Zhishan Guo, Kecheng Yang, Sudharsan Vaidhun, Samsil Arefin, Sajal K. Das, and Haoyi Xiong. 2018. Uniprocessor mixed-criticality scheduling with graceful degradation by completion rate. In 2018 IEEE Real-Time Systems Symposium (RTSS). IEEE, 373\u2013383."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2584612"},{"key":"e_1_3_2_24_2","first-page":"1","volume-title":"2014 International Conference on Embedded Software (EMSOFT)","author":"Huang Pengcheng","year":"2014","unstructured":"Pengcheng Huang, Pratyush Kumar, Georgia Giannopoulou, and Lothar Thiele. 2014. Energy efficient DVFS scheduling for mixed-criticality systems. In 2014 International Conference on Embedded Software (EMSOFT). IEEE, 1\u201310."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/29.5.390"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2789879"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.018"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2014.060919"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534879.3534897"},{"key":"e_1_3_2_31_2","first-page":"1","volume-title":"2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications","author":"Su Hang","year":"2014","unstructured":"Hang Su, Nan Guan, and Dakai Zhu. 2014. Service guarantee exploration for mixed-criticality systems. In 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 1\u201310."},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/REAL.1994.342733","volume-title":"1994 Proceedings Real-Time Systems Symposium","year":"1994","unstructured":"Thuel and Lehoczky. 1994. Algorithms for scheduling hard aperiodic tasks in fixed-priority systems using slack stealing. In 1994 Proceedings Real-Time Systems Symposium. IEEE, 22\u201333."},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/RTSS.2007.47","volume-title":"28th IEEE International Real-Time Systems Symposium (RTSS 2007)","author":"Vestal Steve","year":"2007","unstructured":"Steve Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In 28th IEEE International Real-Time Systems Symposium (RTSS 2007). IEEE, 239\u2013243."},{"key":"e_1_3_2_34_2","first-page":"1","volume-title":"2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","author":"Yang Kecheng","year":"2020","unstructured":"Kecheng Yang, Ashikahmed Bhuiyan, and Zhishan Guo. 2020. F2VD: Fluid rates to virtual deadlines for precise mixed-criticality scheduling on a varying-speed processor. In 2020 IEEE\/ACM International Conference On Computer Aided Design (ICCAD). IEEE, 1\u20139."},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2992999"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3120326"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102849"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100840"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102246"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102524"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103671"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102980"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3246926"},{"key":"e_1_3_2_44_2","article-title":"Criticality-aware EDF scheduling for constrained-deadline imprecise mixed-criticality systems","author":"Zhang Yi-Wen","year":"2023","unstructured":"Yi-Wen Zhang, Jin-Peng Ma, Hui Zheng, and Zonghua Gu. 2023. Criticality-aware EDF scheduling for constrained-deadline imprecise mixed-criticality systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023).","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_2_45_2","article-title":"EDF-based energy-efficient semi-clairvoyant scheduling with graceful degradation","author":"Zhang Yi-Wen","year":"2023","unstructured":"Yi-Wen Zhang, Hui Zheng, and Zonghua Gu. 2023. EDF-based energy-efficient semi-clairvoyant scheduling with graceful degradation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023).","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:51:04Z","timestamp":1750287064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,10]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3632749"],"URL":"https:\/\/doi.org\/10.1145\/3632749","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,10]]},"assertion":[{"value":"2023-05-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}