{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:45:52Z","timestamp":1742993152454,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031666759"},{"type":"electronic","value":"9783031666766"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-66676-6_3","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:04:18Z","timestamp":1725451458000},"page":"46-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Utilising Assumptions to\u00a0Determine the\u00a0WCET of\u00a0Multi-component Classification Systems"],"prefix":"10.1007","author":[{"given":"Alan","family":"Burns","sequence":"first","affiliation":[]},{"given":"Sanjoy","family":"Baruah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Baruah, S.K. , Burns, A., Wu, Y.: Optimal synthesis of IDK-cascades. In: Proceedings of the 29th International Conference on Real Time Networks and Systems, RTNS. ACM (2021)","DOI":"10.1145\/3453417.3453425"},{"key":"3_CR2","unstructured":"Bellman, R.: Dynamic Programming, 1st edn. Princeton University Press, Princeton (1957)"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Bowden, L.: The story of IFF (Identification Friend or Foe). IEE Proc. A Phys. Sci. Measur. Instrument. Manag. Educ. Rev. 132(6), 435 (1985). https:\/\/doi.org\/10.1049\/ip-a-1.1985.0079","DOI":"10.1049\/ip-a-1.1985.0079"},{"key":"3_CR4","unstructured":"Burns, A.: Multi-model systems\u2014an MCS by any other name. In: Proceedings of the WMC Workshop, IEEE Real-Time Systems Symposium (RTSS) (2020)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Burns, A., Baruah, S.: Multi-model specifications and their application to classification systems. In: Proceedings of the 31th International Conference on Real-Time Networks and Systems, RTNS 2023. ACM (2023)","DOI":"10.1145\/3575757.3575760"},{"issue":"6","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3131347","volume":"50","author":"A Burns","year":"2017","unstructured":"Burns, A., Davis, R.I.: A survey of research into mixed criticality systems. ACM Comput. Surv. 50(6), 1\u201337 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"3_CR7","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1093\/comjnl\/bxz019","volume":"63","author":"A Burns","year":"2020","unstructured":"Burns, A., Hayes, I.J., Jones, C.B.: Deriving specifications of control programs for cyber physical systems. Comput. J. 63(5), 774\u2013790 (2020)","journal-title":"Comput. J."},{"issue":"8","key":"3_CR8","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/JPROC.2019.2921977","volume":"107","author":"J Chen","year":"2019","unstructured":"Chen, J., Ran, X.: Deep learning with edge computing: a review. Proc. IEEE 107(8), 1655\u20131674 (2019)","journal-title":"Proc. IEEE"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Chen, Y.-F., et al.: Automated assume-guarantee reasoning through implicit learning. In: Touili, T., Cook, B., Jackson, P. (eds.) Computer Aided Verification, pp. 511\u2013526. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_44","DOI":"10.1007\/978-3-642-14295-6_44"},{"key":"3_CR10","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press (2009)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Davis, R., Baruah, S., Burns, A., Wu, Y.: Optimally ordering IDK classifiers subject to deadlines. Real-Time Systems (2022)","DOI":"10.1007\/s11241-022-09383-w"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"551","DOI":"10.14429\/dsj.73.18319","volume":"73","author":"P Gupta","year":"2023","unstructured":"Gupta, P., Pooja, J., Kakde, O.G.: Deep learning techniques in radar emitter identification. Def. Sci. J. 73, 551 (2023)","journal-title":"Def. Sci. J."},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Hayes, I.J., Jackson, M.A., Jones, C.B.: Determining the specification of a control system from that of its environment. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 154\u2013169. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45236-2_10","DOI":"10.1007\/978-3-540-45236-2_10"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Hayes, I.J., Jones, C.B.: A guide to rely\/guarantee thinking. In: Bowen, J.P., Liu, Z., Zhang, Z. (eds.) SETSS 2017. LNCS, vol. 11174, pp. 1\u201338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02928-9_1","DOI":"10.1007\/978-3-030-02928-9_1"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Henzinger, T.A., Qadeer, S., Rajamani, S.K.: You assume, we guarantee: methodology and case studies. In: Hu, A.J., Vardi, M.Y. (eds.) Computer Aided Verification, pp. 440\u2013451. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0028765","DOI":"10.1007\/BFb0028765"},{"key":"3_CR16","unstructured":"Jones, C.B.: Development Methods for Computer Programs including a Notion of Interference. PhD thesis, Oxford University (1981). Printed as: Programming Research Group, Technical Monograph 25"},{"key":"3_CR17","unstructured":"Jones, C.B.: Specification and design of (parallel) programs. In: Proceedings of IFIP, pp. 321\u2013332. North-Holland (1983)"},{"issue":"4","key":"3_CR18","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1145\/69575.69577","volume":"5","author":"CB Jones","year":"1983","unstructured":"Jones, C.B.: Tentative steps toward a development method for interfering programs. Trans. Program. Lang. Syst. 5(4), 596\u2013619 (1983)","journal-title":"Trans. Program. Lang. Syst."},{"issue":"2","key":"3_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/BF00122417","volume":"8","author":"CB Jones","year":"1996","unstructured":"Jones, C.B.: Accommodating interference in the formal design of concurrent object-based programs. Formal Methods Syst. Design 8(2), 105\u2013122 (1996)","journal-title":"Formal Methods Syst. Design"},{"issue":"5","key":"3_CR20","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.jlamp.2016.01.002","volume":"85","author":"CB Jones","year":"2016","unstructured":"Jones, C.B., Hayes, I.J.: Possible values: exploring a concept for concurrency. J. Logic. Algeb. Methods Program. 85(5), 972\u2013984 (2016)","journal-title":"J. Logic. Algeb. Methods Program."},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Jones, C.B., Hayes, I.J., Jackson, M.A.: Deriving specifications for systems that are connected to the physical world. In: Jones, C.B., Liu, Z., Woodcock, J. (eds.) Formal Methods and Hybrid Real-Time Systems. LNCS, vol. 4700, pp. 364\u2013390. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75221-9_16","DOI":"10.1007\/978-3-540-75221-9_16"},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s00165-010-0156-1","volume":"23","author":"CB Jones","year":"2011","unstructured":"Jones, C.B., Pierce, K.G.: Elucidating concurrent algorithms via layers of abstraction and reification. Formal Aspects Comput. 23(3), 289\u2013306 (2011)","journal-title":"Formal Aspects Comput."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Powell, D.: Failure mode assumptions and assumption coverage. In: Proceedings of the 22nd International Symposium on Fault-Tolerant Computing (FTCS-22), pp. 386\u2013395. IEEE Computer Society Press (1992)","DOI":"10.1109\/FTCS.1992.243562"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Razavi, K., Luthra, M., Koldehofe, B., Muhlhauser, M.M., Wang, L.: FA2: fast, accurate autoscaling for serving deep learning inference with SLA guarantees. In: Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) (2022)","DOI":"10.1109\/RTAS54340.2022.00020"},{"issue":"4","key":"3_CR25","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manage. 45(4), 427\u2013437 (2009)","journal-title":"Inf. Process. Manage."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Vestal, S.: Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In: Proceedings of the Real-Time Systems Symposium (RTSS), pp. 239\u2013243 (2007)","DOI":"10.1109\/RTSS.2007.47"},{"key":"3_CR27","unstructured":"Wang, X., Luo, Y., Crankshaw, D., Tumanov, A., Yu, F., Gonzalez, J.E.: IDK cascades: fast deep learning by learning not to overthink. arXiv preprint arXiv:1706.00885 (2018)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Yao, S., Hu, S., Zhao, Y., Zhang, A., Abdelzaher, T.: Deepsense: a unified deep learning framework for time-series mobile sensing data processing. In: Proceedings of the 26th International Conference on World Wide Web, pp. 351\u2013360 (2017)","DOI":"10.1145\/3038912.3052577"}],"container-title":["Lecture Notes in Computer Science","The Practice of Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66676-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:14:44Z","timestamp":1732734884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66676-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031666759","9783031666766"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66676-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}