{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T11:25:47Z","timestamp":1763551547877},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426738"},{"type":"electronic","value":"9783540454496"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45449-7_32","type":"book-chapter","created":{"date-parts":[[2007,9,21]],"date-time":"2007-09-21T11:54:26Z","timestamp":1190375666000},"page":"469-485","source":"Crossref","is-referenced-by-count":104,"title":["Reliable and Precise WCET Determination for a Real-Life Processor"],"prefix":"10.1007","author":[{"given":"Christian","family":"Ferdinand","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reinhold","family":"Heckmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Langenbach","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Florian","family":"Martin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Schmidt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henrik","family":"Theiling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephan","family":"Thesing","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reinhard","family":"Wilhelm","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,9,27]]},"reference":[{"key":"32_CR1","unstructured":"http:\/\/www.aisee.com . aiSee Home Page."},{"key":"32_CR2","unstructured":"A. V. Aho, R. Sethi, and J.D. Ullman. Compilers: Principles, Techniques, and Tools. Addison Wesley, 1986."},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Patrick Cousot and Radhia Cousot. Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In Proceedings of the 4th ACM Symposium on Principles of Programming Languages, 1977.","DOI":"10.1145\/512950.512973"},{"key":"32_CR4","unstructured":"Motorola. Coldfire Microprocessor Family Programmer\u2019s Reference Manual, 1997."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Christian Ferdinand. Cache Behavior Prediction for Real-Time Systems. PhD Thesis, Universit\u00e4t des Saarlandes, 1997.","DOI":"10.1007\/BFb0057777"},{"key":"32_CR6","unstructured":"Christian Ferdinand, Florian Martin, and Reinhard Wilhelm. Applying Compiler Techniques to Cache Behavior Prediction. In Proceedings of the ACM SIGPLAN Workshop on Language, Compiler and Tool Support for Real-Time Systems, 1997."},{"key":"32_CR7","unstructured":"Christian Ferdinand, Florian Martin, Reinhard Wilhelm, and Martin Alt. Cache Behavior Prediction by Abstract Interpretation. Science of Computer Programming, Elsevier, 1998."},{"key":"32_CR8","unstructured":"Marc Langenbach. CRL-A Uniform Representation for Control Flow. Technical report, Universit\u00e4t d. Saarlandes, 1998."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Florian Martin. PAG\u2014an efficient program analyzer generator. International Journal on Software Tools for Technology Transfer, 2(1), 1998.","DOI":"10.1007\/s100090050017"},{"key":"32_CR10","unstructured":"Florian Martin. Generation of Program Analyzers. PhD thesis, Universit \u00e4t d. Saarlandes, 1999."},{"key":"32_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026424","volume-title":"Proceedings of the 7th International Conference on Compiler Construction","author":"F. Martin","year":"1998","unstructured":"Florian Martin, Martin Alt, Reinhard Wilhelm, and Christian Ferdinand. Analysis of Loops. In Kai Koskimies, editor, Proceedings of the 7th International Conference on Compiler Construction, volume 1383 of Lecture Notes in Computer Science. Springer-Verlag, 1998."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Flemming Nielson, Hanne Riis Nielson, and Chris Hankin. Principles of Program Analysis. Springer-Verlag, 1999.","DOI":"10.1007\/978-3-662-03811-6"},{"key":"32_CR13","unstructured":"P. Puschner and C. Koza. Computing Maximum Task Execution Times with Linear Programming Techniques. Technical Report, Technische Universit\u00e4t Wien, Institut f\u00fcr Technische Informatik, Vienna, 1995."},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Chang Yun Park and Alan C. Shaw. Experiments with a Program Timing Tool Based on Source-Level Timing Schema. IEEE Computer, 24(5), 1991.","DOI":"10.1109\/2.76286"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"J\u00f6rn Schneider and Christian Ferdinand. Pipeline Behavior Prediction for Superscalar Processors. Technical Report A\/02\/99, Universit\u00e4t des Saarlandes, 1999.","DOI":"10.1145\/314403.314432"},{"key":"32_CR16","unstructured":"Martin Sicks. Adre\u00dfbestimmung zur Vorhersage des Verhaltens von Daten-Caches. Diploma Thesis, Universit\u00e4t d. Saarlandes, 1997."},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Henrik Theiling. Extracting Safe and Precise Control Flow from Binaries. In Proceedings of the 7th Conference on Real-Time Computing Systems and Applications, Cheju-do, South Korea, December 2000.","DOI":"10.1109\/RTCSA.2000.896367"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Henrik Theiling. Generating Decision Trees for Decoding Binaries. In Proceedings of the ACM SIGPLAN Workshop on Language, Compiler and Tools for Embedded Systems, Snowbird, Utah, USA, June 2001.","DOI":"10.1145\/384197.384213"},{"key":"32_CR19","unstructured":"Reinhard Wilhelm and Dieter Maurer. Compiler Design. International Computer Science Series. Addison-Wesley, 1995. Second Printing."}],"container-title":["Lecture Notes in Computer Science","Embedded Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45449-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T23:28:23Z","timestamp":1629761303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45449-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426738","9783540454496"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45449-7_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}