{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:44Z","timestamp":1750307324622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,5]],"date-time":"2011-06-05T00:00:00Z","timestamp":1307232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0938256CCF-0938255CCF-0916310CCF-0916350"],"award-info":[{"award-number":["CNS-0938256CCF-0938255CCF-0916310CCF-0916350"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0938256CCF-0938255CCF-0916310CCF-0916350"],"award-info":[{"award-number":["CNS-0938256CCF-0938255CCF-0916310CCF-0916350"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,5]]},"DOI":"10.1145\/2024724.2024926","type":"proceedings-article","created":{"date-parts":[[2011,9,6]],"date-time":"2011-09-06T15:10:46Z","timestamp":1315321846000},"page":"906-911","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Virtualizing real-time embedded systems with Java"],"prefix":"10.1145","author":[{"given":"Jan","family":"Vitek","sequence":"first","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2011,6,5]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1324969.1324974"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1289927.1289967"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/604131.604155"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/130854.130862"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/ISORC.2005.31"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/556706"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/584418.584431"},{"key":"e_1_3_2_1_8_1","volume-title":"Real-Time Java Programming: With Java RTS","author":"Bruno E.","year":"2009","unstructured":"E. Bruno and G. Bollella . Real-Time Java Programming: With Java RTS . Addison-Wesley , 2009 . E. Bruno and G. Bollella. Real-Time Java Programming: With Java RTS. Addison-Wesley, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1064979.1064988"},{"key":"e_1_3_2_1_10_1","volume-title":"Symposium on Distributed Objects and Applications","author":"Corsaro A.","year":"2002","unstructured":"A. Corsaro and D. Schmidt . The design and performace of the jRate Real-Time Java implementation . In Symposium on Distributed Objects and Applications , 2002 . A. Corsaro and D. Schmidt. The design and performace of the jRate Real-Time Java implementation. In Symposium on Distributed Objects and Applications, 2002."},{"unstructured":"R. Henriksson. Scheduling Garbage Collection in Embedded Systems. PhD thesis Lund University 1998.  R. Henriksson. Scheduling Garbage Collection in Embedded Systems . PhD thesis Lund University 1998.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Certification of Safety-Critical Software Controlled Systems (SafeCert)","author":"Henties T.","year":"2009","unstructured":"T. Henties , J. Hunt , D. Locke , K. Nilsen , M. Schoeberl , and J. Vitek . Java for safety-critical applications . In Certification of Safety-Critical Software Controlled Systems (SafeCert) , 2009 . T. Henties, J. Hunt, D. Locke, K. Nilsen, M. Schoeberl, and J. Vitek. Java for safety-critical applications. In Certification of Safety-Critical Software Controlled Systems (SafeCert), 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1620405.1620412"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/RTSS.2009.40"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1002\/spe.4380180704"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/RTSS.2006.9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ISORC.2008.40"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1755913.1755922"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/1620405.1620429"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/ISORC.2004.1300326"},{"key":"e_1_3_2_1_21_1","volume-title":"Java Virtual Machine Research and Technology Symposium","author":"Siebert F.","year":"2001","unstructured":"F. Siebert and A. Walter . Deterministic execution of Java's primitive bytecode operations . In Java Virtual Machine Research and Technology Symposium , 2001 . F. Siebert and A. Walter. Deterministic execution of Java's primitive bytecode operations. In Java Virtual Machine Research and Technology Symposium, 2001."}],"event":{"sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE Council on Electronic Design Automation (CEDA)"],"acronym":"DAC '11","name":"DAC '11: The 48th Annual Design Automation Conference 2011","location":"San Diego California"},"container-title":["Proceedings of the 48th Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2024724.2024926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/2024724.2024926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:59Z","timestamp":1750244759000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2024724.2024926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,5]]},"references-count":21,"alternative-id":["10.1145\/2024724.2024926","10.1145\/2024724"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2024724.2024926","relation":{},"subject":[],"published":{"date-parts":[[2011,6,5]]},"assertion":[{"value":"2011-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}