{"id":"https://openalex.org/W2159006324","doi":"https://doi.org/10.1109/rttas.2004.1317265","title":"A priority inheritance-based inversion control methodology for general resource access problems","display_name":"A priority inheritance-based inversion control methodology for general resource access problems","publication_year":2004,"publication_date":"2004-11-13","ids":{"openalex":"https://openalex.org/W2159006324","doi":"https://doi.org/10.1109/rttas.2004.1317265","mag":"2159006324"},"language":"en","primary_location":{"id":"doi:10.1109/rttas.2004.1317265","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rttas.2004.1317265","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073108472","display_name":"Liubo Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Liubo Chen","raw_affiliation_strings":["Department of Computing and Information Sciences, Kansas State University, Manhattan, KS, USA","Dept. of Comput. & Inf. Sci., Kansas State Univ., Manhattan, KS, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Information Sciences, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]},{"raw_affiliation_string":"Dept. of Comput. & Inf. Sci., Kansas State Univ., Manhattan, KS, USA#TAB#","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114245851","display_name":"Masaaki Mizuno","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Mizuno","raw_affiliation_strings":["Department of Computing and Information Sciences, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Information Sciences, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102753086","display_name":"G. Singh","orcid":"https://orcid.org/0000-0002-5005-7078"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"G. Singh","raw_affiliation_strings":["Department of Computing and Information Sciences, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Information Sciences, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073108472"],"corresponding_institution_ids":["https://openalex.org/I189590672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.17995563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"202","last_page":"210"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/semaphore","display_name":"Semaphore","score":0.9387922286987305},{"id":"https://openalex.org/keywords/priority-inversion","display_name":"Priority inversion","score":0.8389819860458374},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8036037087440491},{"id":"https://openalex.org/keywords/priority-ceiling-protocol","display_name":"Priority ceiling protocol","score":0.6476874351501465},{"id":"https://openalex.org/keywords/priority-inheritance","display_name":"Priority inheritance","score":0.6395142078399658},{"id":"https://openalex.org/keywords/concurrency-control","display_name":"Concurrency control","score":0.5522980093955994},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5157890319824219},{"id":"https://openalex.org/keywords/inversion","display_name":"Inversion (geology)","score":0.500403881072998},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4842243194580078},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.482654869556427},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4343750774860382},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20000457763671875},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1527952253818512},{"id":"https://openalex.org/keywords/dynamic-priority-scheduling","display_name":"Dynamic priority scheduling","score":0.14901873469352722},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11344075202941895},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.08662188053131104}],"concepts":[{"id":"https://openalex.org/C95203288","wikidata":"https://www.wikidata.org/wiki/Q221682","display_name":"Semaphore","level":2,"score":0.9387922286987305},{"id":"https://openalex.org/C172828308","wikidata":"https://www.wikidata.org/wiki/Q520734","display_name":"Priority inversion","level":5,"score":0.8389819860458374},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8036037087440491},{"id":"https://openalex.org/C117420606","wikidata":"https://www.wikidata.org/wiki/Q386027","display_name":"Priority ceiling protocol","level":5,"score":0.6476874351501465},{"id":"https://openalex.org/C63160601","wikidata":"https://www.wikidata.org/wiki/Q253831","display_name":"Priority inheritance","level":5,"score":0.6395142078399658},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.5522980093955994},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5157890319824219},{"id":"https://openalex.org/C1893757","wikidata":"https://www.wikidata.org/wiki/Q3653001","display_name":"Inversion (geology)","level":3,"score":0.500403881072998},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4842243194580078},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.482654869556427},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4343750774860382},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20000457763671875},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1527952253818512},{"id":"https://openalex.org/C107568181","wikidata":"https://www.wikidata.org/wiki/Q5319000","display_name":"Dynamic priority scheduling","level":3,"score":0.14901873469352722},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11344075202941895},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.08662188053131104},{"id":"https://openalex.org/C127456818","wikidata":"https://www.wikidata.org/wiki/Q238879","display_name":"Rate-monotonic scheduling","level":4,"score":0.0},{"id":"https://openalex.org/C109007969","wikidata":"https://www.wikidata.org/wiki/Q749565","display_name":"Structural basin","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C175893541","wikidata":"https://www.wikidata.org/wiki/Q1196582","display_name":"Round-robin scheduling","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rttas.2004.1317265","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rttas.2004.1317265","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1527654363","https://openalex.org/W2003243289","https://openalex.org/W2042913560","https://openalex.org/W2115597529","https://openalex.org/W2159334202","https://openalex.org/W2160293203"],"related_works":["https://openalex.org/W2159642117","https://openalex.org/W2383192442","https://openalex.org/W2322202043","https://openalex.org/W2090061591","https://openalex.org/W2380002543","https://openalex.org/W2168867345","https://openalex.org/W2383492079","https://openalex.org/W2101951053","https://openalex.org/W2018679422","https://openalex.org/W2379623399"],"abstract_inverted_index":{"Real-time":[0],"concurrent":[1],"systems":[2],"typically":[3],"involve":[4],"a":[5,47,62,73],"large":[6],"number":[7],"of":[8,125],"components":[9],"interacting":[10],"with":[11,83,96],"one":[12],"another":[13],"in":[14,103],"complex":[15,23,56],"ways.":[16],"In":[17,42],"such":[18,55],"systems,":[19,107],"proper":[20],"and":[21,24,36,108],"often":[22],"elaborate":[25],"resource":[26,57,67],"access":[27,58,68],"policies":[28],"must":[29],"be":[30,116],"incorporated":[31],"to":[32,37,65],"eliminate":[33],"undesirable":[34],"executions":[35],"ensure":[38],"maximum":[39],"possible":[40],"concurrency.":[41],"this":[43],"paper,":[44],"we":[45],"present":[46,61,122],"technique":[48],"for":[49],"priority":[50,85,97],"inversion":[51,86,98],"control":[52,69,87],"when":[53],"using":[54],"policies.":[59],"We":[60,121],"systematic":[63],"approach":[64],"design":[66],"code":[70],"based":[71],"on":[72,93,118,128],"formal":[74],"development":[75],"methodology":[76],"called":[77],"the":[78],"global":[79],"invariant":[80],"approach,":[81],"along":[82],"appropriate":[84],"code.":[88],"Our":[89],"solution":[90,114,127],"relies":[91],"only":[92],"mutex":[94],"locks":[95],"control,":[99],"which":[100],"are":[101],"found":[102],"many":[104],"real-time":[105],"operating":[106],"priority-based":[109],"binary":[110],"semaphores;":[111],"therefore,":[112],"our":[113,126],"can":[115],"implemented":[117],"existing":[119],"infrastructures.":[120],"an":[123],"implementation":[124],"VxWorks.":[129]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
