2000
DOI: 10.1016/s1383-7621(99)00010-7
|View full text |Cite
|
Sign up to set email alerts
|

Complete worst-case execution time analysis of straight-line hard real-time programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
39
0

Year Published

2001
2001
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(46 citation statements)
references
References 21 publications
1
39
0
Order By: Relevance
“…[SA00] uses symbolic execution on the source code level to derive flow information. aiT's loop-bound analysis, see Section 6.1, is based on a combination of an interval-based abstract interpretation and pattern-matching working on the machine code.…”
Section: Control-flow Analysismentioning
confidence: 99%
“…[SA00] uses symbolic execution on the source code level to derive flow information. aiT's loop-bound analysis, see Section 6.1, is based on a combination of an interval-based abstract interpretation and pattern-matching working on the machine code.…”
Section: Control-flow Analysismentioning
confidence: 99%
“…Consequently, various solutions for the low-level analysis of individual path fragments in the presence of caches, pipelines, and branch predictors were proposed (Li and Malik 1999;Lundqvist andStenström 1998, 1999;Stappert and Altenbernd 2000;Theiling and Ferdinand 1998;Schneider and Ferdinand 1999;Ferdinand et al 1999;Colin and Puaut 2000). In contrast to these model-based approach, measurement-based timing analysis (MBTA) proposed the use of timed execution traces of individual code constituents obtained runs of the code on the target hardware (Bernat et al 2002(Bernat et al , 2003Kirner et al 2005;Wenzel et al 2009;Stattelmann and Martin 2010).…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach has its merits when using scoped WCET calculation because the scoping allows to restrict the number of paths within each cluster such that their enumeration becomes feasible. For example, some path-oriented WCET calculation techniques use loop scopes as scopes for the analysis [18,58], which, however, implies that any flow information can address only program parts within the body of a single loop; the body of nested loops or the scope outside the loop cannot be mixed in.…”
Section: Epet (Path-oriented)mentioning
confidence: 99%
“…However, this approach has its merits when using scoped WCET calculation because the scoping allows to restrict the number of paths within each cluster such that their enumeration becomes feasible. For example, some path-oriented WCET calculation techniques use loop scopes as scopes for the analysis [18,58] Static WCET calculation based on EPET is well suited to analyze the effects of pipelines. It allows to model the impact of the pipeline on an instruction sequence longer than just basic blocks, and thus increases the precision of the WCET bound.…”
mentioning
confidence: 99%