{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:10:35Z","timestamp":1773655835356,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540208037","type":"print"},{"value":"9783540246220","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24622-0_25","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T11:33:53Z","timestamp":1283686433000},"page":"309-322","source":"Crossref","is-referenced-by-count":28,"title":["Why AI + ILP Is Good for WCET, but MC Is Not, Nor ILP Alone"],"prefix":"10.1007","author":[{"given":"Reinhard","family":"Wilhelm","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-61739-6_33","volume-title":"Static Analysis","author":"M. Alt","year":"1996","unstructured":"Alt, M., Ferdinand, C., Martin, F., Wilhelm, R.: Cache Behavior Prediction by Abstract Interpretation. In: Cousot, R., Schmidt, D.A. (eds.) SAS 1996. LNCS, vol.\u00a01145, pp. 52\u201366. Springer, Heidelberg (1996)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/3-540-46017-9_6","volume-title":"Model Checking Software","author":"D. Basin","year":"2002","unstructured":"Basin, D., Friedrich, S., Gawkowski, M., Posegga, J.: Bytecode model checking: An experimental analysis. In: Bo\u0161na\u010dki, D., Leue, S. (eds.) SPIN 2002. LNCS, vol.\u00a02318, pp. 42\u201359. Springer, Heidelberg (2002)"},{"key":"25_CR3","unstructured":"Cousot, P.: Automatic verification by abstract interpretation, invited talk. International Symposium in Honor of Zohar Manna, Taormina, Sicily, Italy, Tuesday, July 1 (2003)"},{"key":"25_CR4","unstructured":"Ermedahl, A.: A Modular Tool Architecture for Worst-Case Execution Time Analysis. PhD thesis, Uppsala University (2003)"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/3-540-45449-7_32","volume-title":"Embedded Software","author":"C. Ferdinand","year":"2001","unstructured":"Ferdinand, C., Heckmann, R., Langenbach, M., Martin, F., Schmidt, M., Theiling, H., Thesing, S., Wilhelm, R.: Reliable and precise WCET determination for a real-life processor. In: Henzinger, T.A., Kirsch, C.M. (eds.) EMSOFT 2001. LNCS, vol.\u00a02211, pp. 469\u2013485. Springer, Heidelberg (2001)"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0167-6423(99)00010-6","volume":"35","author":"C. Ferdinand","year":"1999","unstructured":"Ferdinand, C., Martin, F., Wilhelm, R.: Cache Behavior Prediction by Abstract Interpretation. Science of Computer Programming\u00a035, 163\u2013189 (1999)","journal-title":"Science of Computer Programming"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Ferdinand, C.: Cache Behavior Prediction for Real-Time Systems. PhD Thesis, Universit\u00e4t des Saarlandes (September 1997)","DOI":"10.1007\/BFb0057777"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Healy, C.A., Whalley, D.B., Harmon, M.G.: Integrating the Timing Analysis of Pipelining and Instruction Caching. In: Proceedings of the IEEE Real-Time Systems Symposium, December 1995, pp. 288\u2013297 (1995)","DOI":"10.1109\/REAL.1995.495218"},{"issue":"7","key":"25_CR9","first-page":"1038","volume":"91","author":"R. Heckmann","year":"2003","unstructured":"Heckmann, R., Langenbach, M., Thesing, S., Wilhelm, R.: The influence of processor architecture on the design and the results of WCET tools. IEEE Proceedings on Real-Time Systems\u00a091(7), 1038\u20131054 (2003)","journal-title":"IEEE Proceedings on Real-Time Systems"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-45789-5_22","volume-title":"Static Analysis","author":"M. Langenbach","year":"2002","unstructured":"Langenbach, M., Thesing, S., Heckmann, R.: Pipeline modelling for timing analysis. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, p. 294. Springer, Heidelberg (2002)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Li, Y.-T.S., Malik, S.: Performance Analysis of Embedded Software Using Implicit Path Enumeration. In: Proceedings of the 32nd ACM\/IEEE Design Automation Conference, June 1995, pp. 456\u2013461 (1995)","DOI":"10.1145\/217474.217570"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Li, Y.-T.S., Malik, S., Wolfe, A.: Efficient Microarchitecture Modeling and Path Analysis for Real-Time Software. In: Proceedings of the IEEE Real-Time Systems Symposium, December 1995, pp. 298\u2013307 (1995)","DOI":"10.1109\/REAL.1995.495219"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y.-T.S., Malik, S., Wolfe, A.: Performance Estimation of Embedded Software with Instruction Cache Modeling. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, November 1995, pp. 380\u2013387 (1995)","DOI":"10.1109\/ICCAD.1995.480144"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Li, Y.-T.S., Malik, S., Wolfe, A.: Cache Modeling for Real- Time Software: Beyond Direct Mapped Instruction Caches. In: Proceedings of the IEEE Real-Time Systems Symposium (December 1996)","DOI":"10.1109\/REAL.1996.563722"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/BFb0026424","volume-title":"Compiler Construction","author":"F. Martin","year":"1998","unstructured":"Martin, F., Alt, M., Wilhelm, R., Ferdinand, C.: Analysis of Loops. In: Koskimies, K. (ed.) CC 1998. LNCS, vol.\u00a01383, pp. 80\u201394. Springer, Heidelberg (1998)"},{"key":"25_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"issue":"5","key":"25_CR17","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/2.76286","volume":"24","author":"C.Y. Park","year":"1991","unstructured":"Park, C.Y., Shaw, A.C.: Experiments with a Program Timing Tool Based on Source-Level Timing Schema. IEEE Computer\u00a024(5), 48\u201357 (1991)","journal-title":"IEEE Computer"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF00571421","volume":"1","author":"P. Puschner","year":"1989","unstructured":"Puschner, P., Koza, C.: Calculating the Maximum Execution Time of Real- Time Programs. Real-Time Systems\u00a01, 159\u2013176 (1989)","journal-title":"Real-Time Systems"},{"key":"25_CR19","unstructured":"Rosskopf, A.: Vergleich der Performance von zwei Plattformen f\u00fcr Ada- Applikationen: PowerPC\/ObjectAda gegen\u00fcber MC68020\/XDAda. Talk at Ada Deutschland (March 2001)"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Schneider, J., Ferdinand, C.: Pipeline Behaviour Prediction for Superscalar Processors by Abstract Interpretation. In: Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, Atlanta (June 1999)","DOI":"10.1145\/314403.314432"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Theiling, H., Ferdinand, C.: Combining Abstract Interpretation and ILP for Microarchitecture Modelling and Program Path Analysis. In: Proceedings of the 19th IEEE Real-Time Systems Symposium, Madrid, Spain, December 1998, pp. 144\u2013153 (1998)","DOI":"10.1109\/REAL.1998.739739"},{"issue":"2\/3","key":"25_CR22","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1023\/A:1008141130870","volume":"18","author":"H. Theiling","year":"2000","unstructured":"Theiling, H., Ferdinand, C., Wilhelm, R.: Fast and precise WCET prediction by separated cache and path analyses. Real-Time Systems\u00a018(2\/3), 157\u2013179 (2000)","journal-title":"Real-Time Systems"},{"key":"25_CR23","unstructured":"Theiling, H.: Control Flow Graphs for Real-Time System Analysis. PhD thesis, Universit\u00e4t des Saarlandes (2002)"},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/DSN.2003.1209972","volume-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003)","author":"S. Thesing","year":"2003","unstructured":"Thesing, S., Souyris, J., Heckmann, R., Randimbivololona, F., Langenbach, M., Wilhelm, R., Ferdinand, C.: An abstract interpretation-based timing validation of hard real-time avionics software systems. In: Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), June 2003, pp. 625\u2013632. IEEE Computer Society, Los Alamitos (2003)"},{"key":"25_CR25","unstructured":"Thesing, S.: Safe and Precise WCET Determination by Abstract Interpretation of Pipeline Models. PhD thesis, Universit\u00e4t des Saarlandes (forthcoming)"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24622-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T17:40:52Z","timestamp":1559583652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24622-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208037","9783540246220"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24622-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}