Proceedings of the 7th ACM &Amp; IEEE International Conference on Embedded Software - EMSOFT '07 2007
DOI: 10.1145/1289927.1289960
|View full text |Cite
|
Sign up to set email alerts
|

WCET estimation for executables in the presence of data caches

Abstract: This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation, which is used for the dual purposes of tracking address computations and cache behavior. A simultaneous numeric and pointer analysis using an abstraction for discrete sets of values computes safe approximations of access addresses which are then used to predict cache behavior using Must Analysis. A heuristic is also proposed which g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
46
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(46 citation statements)
references
References 11 publications
0
46
0
Order By: Relevance
“…This does not however capture array access patterns. Sen and Srikant (2007) presented an approach that combines automatic executable analysis to determine the addresses accessed and a Must analysis for determining cache behaviour, both using Abstract Interpretation. The overall problem is divided into four sub-problems: address analysis, cache analysis, access sequencing, and worst-case path analysis.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This does not however capture array access patterns. Sen and Srikant (2007) presented an approach that combines automatic executable analysis to determine the addresses accessed and a Must analysis for determining cache behaviour, both using Abstract Interpretation. The overall problem is divided into four sub-problems: address analysis, cache analysis, access sequencing, and worst-case path analysis.…”
Section: Discussionmentioning
confidence: 99%
“…The latter is solved using an ILP formulation. Sen and Srikant (2007) use Circular Linear Progressions (CLPs) to provide a strided linear approximation of the discrete set of memory addresses that may be accessed by a particular instruction.…”
Section: Discussionmentioning
confidence: 99%
“…[2], [3], [4], [5], takes the two-step approach already explained in Section II: First, an address analysis, e.g. an interval analysis, computes an approximation to the set of possibly accessed addresses for each memory reference.…”
Section: Related Workmentioning
confidence: 99%
“…They compute may-cache, dominator and post-dominator information in order to classify the memory references. Sen et al [3] propose Circular Linear Progressions (CLPs) for address analysis. Those are more expressive than intervals and allow to precisely model memory references that depend on loop induction variables.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation