{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:48:12Z","timestamp":1749271692604,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642032363"},{"type":"electronic","value":"9783642032370"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03237-0_10","type":"book-chapter","created":{"date-parts":[[2009,8,3]],"date-time":"2009-08-03T05:24:37Z","timestamp":1249277077000},"page":"120-136","source":"Crossref","is-referenced-by-count":11,"title":["Abstract Interpretation of FIFO Replacement"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Grund","sequence":"first","affiliation":[]},{"given":"Jan","family":"Reineke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1347375.1347389","volume":"7","author":"R. Wilhelm","year":"2008","unstructured":"Wilhelm, R., Engblom, J., Ermedahl, A., Holsti, N., Thesing, S., Whalley, D., Bernat, G., Ferdinand, C., Heckmann, R., Mitra, T., Mueller, F., Puaut, I., Puschner, P., Staschulat, J., Stenstr\u00f6m, P.: The worst-case execution-time problem\u2014overview of methods and survey of tools. Transactions on Embedded Computing Systems\u00a07(3), 1\u201353 (2008)","journal-title":"Transactions on Embedded Computing Systems"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-61739-6_33","volume-title":"Static Analysis","author":"M. Alt","year":"1996","unstructured":"Alt, M., Ferdinand, C., Martin, F., Wilhelm, R.: Cache behavior prediction by abstract interpretation. In: Cousot, R., Schmidt, D.A. (eds.) SAS 1996. LNCS, vol.\u00a01145, pp. 52\u201366. Springer, Heidelberg (1996)"},{"issue":"2-3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1008186323068","volume":"17","author":"C. Ferdinand","year":"1999","unstructured":"Ferdinand, C., Wilhelm, R.: Efficient and precise cache behavior prediction for real-time systems. Real-Time Systems\u00a017(2-3), 131\u2013181 (1999)","journal-title":"Real-Time Systems"},{"key":"10_CR4","first-page":"192","volume-title":"RTAS 1997: Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium","author":"R.T. White","year":"1997","unstructured":"White, R.T., Healy, C.A., Whalley, D.B., Mueller, F., Harmon, M.G.: Timing analysis for data caches and set-associative caches. In: RTAS 1997: Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium, Washington, DC, USA, p. 192. IEEE Computer Society, Los Alamitos (1997)"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/291069.291051","volume-title":"ASPLOS-VIII: Proceedings of the Eighth International Conference on Architectural Support for Programming Languages and Operating Systems","author":"S. Ghosh","year":"1998","unstructured":"Ghosh, S., Martonosi, M., Malik, S.: Precise miss analysis for program transformations with caches of arbitrary associativity. In: ASPLOS-VIII: Proceedings of the Eighth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 228\u2013239. ACM Press, New York (1998)"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/378795.378859","volume-title":"PLDI 2001: Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation","author":"S. Chatterjee","year":"2001","unstructured":"Chatterjee, S., Parker, E., Hanlon, P.J., Lebeck, A.R.: Exact analysis of the cache behavior of nested loops. In: PLDI 2001: Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation, pp. 286\u2013297. ACM Press, New York (2001)"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s11241-007-9032-3","volume":"37","author":"J. Reineke","year":"2007","unstructured":"Reineke, J., Grund, D., Berg, C., Wilhelm, R.: Timing predictability of cache replacement policies. Real-Time Systems\u00a037(2), 99\u2013122 (2007)","journal-title":"Real-Time Systems"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1375657.1375665","volume-title":"LCTES 2008: Proceedings of the 2008 ACM SIGPLAN-SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems","author":"J. Reineke","year":"2008","unstructured":"Reineke, J., Grund, D.: Relative competitive analysis of cache replacement policies. In: LCTES 2008: Proceedings of the 2008 ACM SIGPLAN-SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp. 51\u201360. ACM Press, New York (2008)"},{"key":"10_CR9","volume-title":"Memory Systems: Cache, DRAM, Disk","author":"B. Jacob","year":"2008","unstructured":"Jacob, B., Ng, S.W., Wang, D.T.: Memory Systems: Cache, DRAM, Disk. Morgan Kaufmann Publishers, San Francisco (2008)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-1-4020-8157-6_27","volume-title":"Building the Information Society","author":"P. Cousot","year":"2004","unstructured":"Cousot, P., Cousot, R.: Basic Concepts of Abstract Interpretation. In: Building the Information Society, pp. 359\u2013366. Kluwer Academic Publishers, Dordrecht (2004)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Ferdinand, C.: Cache Behaviour Prediction for Real-Time Systems. PhD thesis, Saarland University (1997)","DOI":"10.1007\/BFb0057777"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-540-77505-8_23","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"P. Cousot","year":"2008","unstructured":"Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Min\u00e9, A., Monniaux, D., Rival, X.: Combination of abstractions in the ASTR\u00c9E static analyzer. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol.\u00a04435, pp. 272\u2013300. Springer, Heidelberg (2008)"},{"key":"10_CR13","first-page":"317","volume-title":"ICS 1997: Proceedings of the 11th International Conference on Supercomputing","author":"S. Ghosh","year":"1997","unstructured":"Ghosh, S., Martonosi, M., Malik, S.: Cache miss equations: An analytical representation of cache misses. In: ICS 1997: Proceedings of the 11th International Conference on Supercomputing, pp. 317\u2013324. ACM Press, New York (1997)"},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1145\/325478.325479","volume":"21","author":"S. Ghosh","year":"1999","unstructured":"Ghosh, S., Martonosi, M., Malik, S.: Cache miss equations: A compiler framework for analyzing and tuning memory behavior. ACM Transactions on Programming Languages and Systems\u00a021(4), 703\u2013746 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10_CR15","unstructured":"Mueller, F., Whalley, D.B., Harmon, M.: Predicting instruction cache behavior. In: LCTRTS 1994: Proceedings of the ACM SIGPLAN Workshop on Language, Compiler, and Tool Support for Real-Time Systems (1994)"},{"key":"10_CR16","first-page":"254","volume-title":"RTSS 1996: Proceedings of the 17th IEEE Real-Time Systems Symposium, Washington, DC, USA","author":"Y.T.S. Li","year":"1996","unstructured":"Li, Y.T.S., Malik, S., Wolfe, A.: Cache modeling for real-time software: Beyond direct mapped instruction caches. In: RTSS 1996: Proceedings of the 17th IEEE Real-Time Systems Symposium, Washington, DC, USA, p. 254. IEEE Computer Society, Los Alamitos (1996)"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D. Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. Journal of the ACM\u00a030(2), 323\u2013342 (1983)","journal-title":"Journal of the ACM"},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/117009.117015","volume":"13","author":"W. Peng","year":"1991","unstructured":"Peng, W., Iyer, S.P.: Data flow analysis of communicating finite-state machines. ACM Transactions on Programming Languages and Systems\u00a013(3), 399\u2013442 (1991)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"1-2","key":"10_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0304-3975(99)00033-X","volume":"221","author":"A. Bouajjani","year":"1999","unstructured":"Bouajjani, A., Habermehl, P.: Symbolic reachability analysis of FIFO-channel systems with nonregular sets of configurations. Theoretical Computer Science\u00a0221(1-2), 211\u2013250 (1999)","journal-title":"Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03237-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:10:41Z","timestamp":1739290241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03237-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642032363","9783642032370"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03237-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}