{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:57:45Z","timestamp":1767927465837,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540741299","type":"print"},{"value":"9783540741305","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74130-5_14","type":"book-chapter","created":{"date-parts":[[2007,8,13]],"date-time":"2007-08-13T15:32:56Z","timestamp":1187019176000},"page":"235-252","source":"Crossref","is-referenced-by-count":5,"title":["Worst-Case Execution Times for a Purely Functional Language"],"prefix":"10.1007","author":[{"given":"Armelle","family":"Bonenfant","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Ferdinand","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kevin","family":"Hammond","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reinhold","family":"Heckmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Augustsson, L.: Compiling Lazy Functional Languages, Part II. PhD thesis, Dept. of Computer Science, Chalmers University of Technology, G\u00f6teborg, Sweden (1987)"},{"key":"14_CR2","unstructured":"Bernat, G., Burns, A., Wellings, A.: Portable Worst-Case Execution Time Analysis Using Java Byte Code. In: Proc. 12th Euromicro Intl. Conf. on Real-Time Systems (ECRTS 2000), Stockholm (June 2000)"},{"key":"14_CR3","unstructured":"Bernat, G., Colin, A., Petters, S.M.: WCET Analysis of Probabilistic Hard Real-Time Systems. In: Proc. 23rd IEEE Real-Time Systems Symposium (RTSS 2002) (December 2002)"},{"key":"14_CR4","unstructured":"Bonenfant, A., Chen, Z., Hammond, K., Michaelson, G.J., Wallace, A., Wallace, I.: Towards resource-certified software: A formal cost model for time and its application to an image-processing example. In: ACM Symposium on Applied Computing (SAC \u201907), Seoul, Korea (March 11-15, 2007)"},{"key":"14_CR5","unstructured":"Byhlin, S., Ermedahl, A., Gustafsson, J., Lisper, B.: Applying static WCET analysis to automotive communication software. In: 17th Euromicro Conference of Real-Time Systems, (ECRTS\u201905), Mallorca, Spain (July 2005)"},{"issue":"5","key":"14_CR6","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TPAMI.2003.1195991","volume":"25","author":"D. Comaniciu","year":"2003","unstructured":"Comaniciu, D., Ramesh, V., Meer, P.: Kernel-based object tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a025(5), 564\u2013575 (2003)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"14_CR7","unstructured":"Renesas\u00a0Technology Corp. (2006), Home Page http:\/\/www.renesas.com"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Corti, M., Gross, T.: Approximation of the Worst-Case Execution Time Using Structural Analysis. In: Proc. ACM International Conference on Embedded Software (EMSOFT 2004) (2004)","DOI":"10.1145\/1017753.1017797"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1145\/512950.512973","volume-title":"4th ACM Symposium on Principles of Programming Languages","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: 4th ACM Symposium on Principles of Programming Languages, pp. 238\u2013252. ACM Press, New York (1977)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Crary, K., Weirich, S.: Resource Bound Certification. In: POPL 2000 \u2014 Symposium on Principles of Prog. Langs. pp. 184\u2013198, Boston, MA (January 2000)","DOI":"10.1145\/325694.325716"},{"key":"14_CR11","unstructured":"Ferdinand, C.: Cache Behavior Prediction for Real-Time Systems, Saarland University, Saarbr\u00fccken, Germany. PhD thesis (1997)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/3-540-45449-7_32","volume-title":"Embedded Software","author":"C. Ferdinand","year":"2001","unstructured":"Ferdinand, C., Heckmann, R., Langenbach, M., Martin, F., Schmidt, M., Theiling, H., Thesing, S., Wilhelm, R.: Reliable and precise WCET determination for a real-life processor. In: Henzinger, T.A., Kirsch, C.M. (eds.) EMSOFT 2001. LNCS, vol.\u00a02211, pp. 469\u2013485. Springer, Heidelberg (2001)"},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0167-6423(99)00010-6","volume":"35","author":"C. Ferdinand","year":"1999","unstructured":"Ferdinand, C., Martin, F., Wilhelm, R., Alt, M.: Cache behavior prediction by abstract interpretation. Science of Computer Programming\u00a035(2), 163\u2013189 (1999)","journal-title":"Science of Computer Programming"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Hammond, K.: Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: the Hume Approach. In: Central European Summer School on Functional Programming, July 2005. Spinger-Verlag LNCS (to appear)","DOI":"10.1007\/11894100_4"},{"key":"14_CR15","unstructured":"Hammond, K., Ferdinand, C., Heckmann, R., Dyckhoff, R., Hofmann, M., Jost, S., Loidl, H.-W., Michaelson, G.J., Pointon, R., Scaife, N., S\u00e9rot, J., Wallace, A.: Towards Formally Verifiable WCET Analysis for a Functional Programming Language. In: Proc. Intl. Workshop on Worst-Case Execution Time (WCET) Analysis (April 2006)"},{"key":"14_CR16","unstructured":"Hammond, K., Michaelson, G.: Bounded Space Programming using Finite State Machines and Recursive Functions: the Hume Approach. ACM Transactions on Software Engineering and Methodology (TOSEM 2006) (in preparation)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-540-39815-8_3","volume-title":"Generative Programming and Component Engineering","author":"K. Hammond","year":"2003","unstructured":"Hammond, K., Michaelson, G.J.: Hume: a Domain-Specific Language for Real-Time Embedded Systems. In: Pfenning, F., Smaragdakis, Y. (eds.) GPCE 2003. LNCS, vol.\u00a02830, pp. 37\u201356. Springer, Heidelberg (2003)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44854-3_1","volume-title":"Implementation of Functional Languages","author":"K. Hammond","year":"2003","unstructured":"Hammond, K., Michaelson, G.J.: Predictable Space Behaviour in FSM-Hume. In: Pe\u00f1a, R., Arts, T. (eds.) IFL 2002. LNCS, vol.\u00a02670, Springer, Heidelberg (2003)"},{"issue":"7","key":"14_CR19","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/JPROC.2003.814618","volume":"91","author":"R. Heckmann","year":"2003","unstructured":"Heckmann, R., Langenbach, M., Thesing, S., Wilhelm, R.: The influence of processor architecture on the design and the results of WCET tools. Proceedings of the IEEE\u00a091(7), 1038\u20131054 (July 2003) Special Issue on Real-Time Systems.","journal-title":"Proceedings of the IEEE"},{"key":"14_CR20","volume-title":"POPL\u201903 \u2014 Symposium on Principles of Programming Languages","author":"M. Hofmann","year":"2003","unstructured":"Hofmann, M., Jost, S.: Static Prediction of Heap Space Usage for First-Order Functional Programs. In: POPL\u201903 \u2014 Symposium on Principles of Programming Languages, New Orleans, LA, USA, ACM Press, New York (2003)"},{"key":"14_CR21","unstructured":"Hughes, R.J.M.: The Design and Implementation of Programming Languages, DPhil Thesis, Programming Research Group, Oxford (July 1983)"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-45789-5_22","volume-title":"Static Analysis","author":"M. Langenbach","year":"2002","unstructured":"Langenbach, M., Thesing, S., Heckmann, R.: Pipeline modeling for timing analysis. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 294\u2013309. Springer, Heidelberg (2002)"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Li, Y.-T.S., Malik, S., Wolfe, A.: Efficient Microarchitecture Modeling and Path Analysis for Real-Time Software. In: Proc. RTSS 1995: IEEE Real-Time Systems Symposium, pp. 298 (1995)","DOI":"10.1109\/REAL.1995.495219"},{"key":"14_CR24","unstructured":"Meyerh\u00f6fer, M., Lauterwald, F.: Towards Platform-Independent Component Measurement. In: Proc. WCOP 2005 \u2013 Tenth International Workshop on Component-Oriented Programming, Glasgow (July 2005)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Puschner, P., Bernat, G.: WCET Analysis of Reusable Portable Code. In: Proc. 13th Euromicro Intl. Conf. on Real-Time Syst. (ECRTS 2001), pp. 45\u201352 (2001)","DOI":"10.1109\/EMRTS.2001.933998"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11925040_10","volume-title":"Leveraging Applications of Formal Methods","author":"D. Sandell","year":"2006","unstructured":"Sandell, D., Ermedahl, A., Gustafsson, J., Lisper, B.: Static timing analysis of real-time operating system code. In: Margaria, T., Steffen, B. (eds.) ISoLA 2004. LNCS, vol.\u00a04313, Springer, Heidelberg (2006)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Sehlberg, D.: Static WCET analysis of task-oriented code for construction vehicles. Master\u2019s thesis, M\u00e4lardalen University, (October 2005)","DOI":"10.1109\/ISoLA.2006.63"},{"key":"14_CR28","unstructured":"Souyris, J., Le Pavec, E., Himbert, G., J\u00e9gu, V., Borios, G., Heckmann, R.: Computing the Worst Case Execution Time of an Avionics Program by Abstract Interpretation. In: Proc. 2005 Intl Workshop on Worst-Case Execution Time (WCET) Analysis, pp. 21\u201324 (2005)"},{"key":"14_CR29","unstructured":"IAR Systems (2006), Home Page http:\/\/www.iar.com\/"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Theiling, H., Ferdinand, C.: Combining abstract interpretation and ILP for microarchitecture modelling and program path analysis. In: Proc. RTSS\u00a01998: IEEE Real-Time Systems Symposium, pp. 144\u2013153, Madrid, Spain (December 1998)","DOI":"10.1109\/REAL.1998.739739"},{"key":"14_CR31","unstructured":"Vasconcelos, P.B.: Cost Inference and Analysis for Recursive Functional Programs. PhD thesis, University of St Andrews (in preparation)"},{"key":"14_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-540-27861-0_6","volume-title":"Implementation of Functional Languages","author":"P.B. Vasconcelos","year":"2004","unstructured":"Vasconcelos, P.B., Hammond, K.: Inferring Costs for Recursive, Polymorphic and Higher-Order Functional Programs. In: Trinder, P., Michaelson, G.J., Pe\u00f1a, R. (eds.) IFL 2003. LNCS, vol.\u00a03145, pp. 86\u2013101. Springer, Heidelberg (2004)"},{"key":"14_CR33","volume-title":"Handbook on Embedded Systems","author":"R. Wilhelm","year":"2005","unstructured":"Wilhelm, R.: Determining bounds on execution times. In: Zurawski, R. (ed.) Handbook on Embedded Systems, CRC Press, Boca Raton pp. 14\u20131,14\u201323. (2005)"},{"key":"14_CR34","unstructured":"Wong, P.: Bytecode Monitoring of Java Programs, MSc thesis, University of Warwick (2003)"}],"container-title":["Lecture Notes in Computer Science","Implementation and Application of Functional Languages"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74130-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T09:21:46Z","timestamp":1737364906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74130-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540741299","9783540741305"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74130-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}