{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:12:50Z","timestamp":1725732770823},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664505"},{"type":"electronic","value":"9783662010693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-662-01069-3_60","type":"book-chapter","created":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T14:47:02Z","timestamp":1371739622000},"page":"410-419","source":"Crossref","is-referenced-by-count":9,"title":["Run-Time Guarantees for Real-Time Systems\u2014The USES Approach"],"prefix":"10.1007","author":[{"given":"Christian","family":"Ferdinand","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"K\u00e4stner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Langenbach","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Florian","family":"Martin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Schmidt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J\u00f6rn","family":"Schneider","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henrik","family":"Theiling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephan","family":"Thesing","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reinhard","family":"Wilhelm","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"60_CR1","volume-title":"Addison Wesley","author":"AV Aho","year":"1986","unstructured":"A.V. Aho, R. Sethi, and J.D. Ullman. Compilers: Principles, Techniques, and Tools. Addison Wesley, 1986."},{"key":"60_CR2","volume-title":"Functional Specification of SALTO: A Retargetable System for Assembly Language Transformation and Optimization. rev. 1.00 beta","author":"F Bodin","year":"1997","unstructured":"F. Bodin, Z. Chamski, E. Rohou, and A. Seznec. Functional Specification of SALTO: A Retargetable System for Assembly Language Transformation and Optimization. rev. 1.00 beta. INRIA, June 1997."},{"key":"60_CR3","first-page":"238","volume-title":"Popl","author":"P Cousot","year":"1977","unstructured":"P. Cousot and R. Cousot. Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In POPL, pages 238 - 252, January 1977."},{"key":"60_CR4","volume-title":"Cache Behavior Prediction for Real-Time Systems","author":"C Ferdinand","year":"1997","unstructured":"C. Ferdinand. Cache Behavior Prediction for Real-Time Systems. PhD Thesis, Uni. d. Saarlandes, September 1997."},{"key":"60_CR5","first-page":"37","volume-title":"Lctrts","author":"C Ferdinand","year":"1997","unstructured":"C. Ferdinand, F. Martin, and R. Wilhelm. Applying Compiler Techniques to Cache Behavior Prediction. In LCTRTS, pages 37 - 46, June 1997."},{"key":"60_CR6","volume-title":"Elsevier","author":"C Ferdinand","year":"1998","unstructured":"C. Ferdinand, F. Martin, R. Wilhelm, and M. Alt. Cache Behavior Prediction by Abstract Interpretation. Science of Computer Programming, Elsevier, 1998."},{"key":"60_CR7","volume-title":"European Design and Test Conference. IEEE","author":"A Fauth","year":"1995","unstructured":"A. Fauth, J. Van Praet, and M. Freericks. Describing Instruction Set Processors Using nML. In European Design and Test Conference. IEEE, 1995."},{"key":"60_CR8","volume-title":"Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems","author":"C Ferdinand","year":"1998","unstructured":"C. Ferdinand and R. Wilhelm. On Predicting Data Cache Behavior for Real-Time Systems. In Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, June 1998."},{"key":"60_CR9","volume-title":"Instruction Set Description Language Version 1.0","author":"George Hadjiyiannis. ISDL","year":"1998","unstructured":"George Hadjiyiannis. ISDL: Instruction Set Description Language Version 1.0. Technical report, MIT RLE, April 1998."},{"key":"60_CR10","volume-title":"Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems","author":"D K\u00e4stner","year":"1998","unstructured":"D. K\u00e4stner and S. Thesing. Cache Sensitive Pre-Runtime Scheduling. In Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers and Tools for Embedded Systems, Montreal, Canada, June 1998."},{"issue":"7","key":"60_CR11","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/32.392980","volume":"21","author":"S-S Lim","year":"1995","unstructured":"S.-S. Lim, Y. H. Bae, G. T. Jang, B.-D. Rhee, S. L. Min, C. Y. Park, H. Shin, K. Park, S.-M. Moon, and C. S. Kim. An Accurate Worst Case Timing Analysis for RISC Processors. IEEE Transactions on Software Engineering, 21 (7): 593 - 604, July 1995.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"60_CR12","volume-title":"Rtss","author":"Y Li","year":"1996","unstructured":"Y.-T. S. Li, S. Malik, and A. Wolfe. Cache Modeling for Real-Time Software: Beyond Direct Mapped Instruction Caches. In RTSS, December 1996."},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"F. Martin. PAG\u2014an efficient program analyzer generator. International Journal on Software Tools for Technology Transfer, 2 (1), 1998.","DOI":"10.1007\/s100090050017"},{"key":"60_CR14","unstructured":"F. Martin. Generation of Program Analyzers PhD thesis, Uni. d. Saarlandes, 1999. to appear."},{"key":"60_CR15","volume-title":"Proceedings of the International Conference on Compiler Construction (CC98)","author":"F Martin","year":"1998","unstructured":"F. Martin, M. Alt, R. Wilhelm, and C. Ferdinand. Analysis of Loops. In Proceedings of the International Conference on Compiler Construction (CC98). Springer, 1998."},{"key":"60_CR16","volume-title":"Generalizing Timing Predictions to Set-Associative Caches. TR96-66, Institut f","author":"F Mueller","year":"1996","unstructured":"F. Mueller. Generalizing Timing Predictions to Set-Associative Caches. TR96-66, Institut f. Informatik, Humboldt-University, July 1996."},{"key":"60_CR17","volume-title":"Lctrts","author":"F Mueller","year":"1994","unstructured":"F. Mueller, D. B. Whalley, and M. Harmon. Predicting Instruction Cache Behavior. In LCTRTS, 1994."},{"key":"60_CR18","volume-title":"Springer","author":"F Nielson","year":"1999","unstructured":"F. Nielson, H. R. Nielson, and C. Hankin. Principles of Program Analysis. Springer, 1999."},{"key":"60_CR19","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF00571421","volume":"1","author":"P Puschner","year":"1989","unstructured":"P. Puschner and Ch. Koza. Calculating the Maximum Execution Time of Real-Time Programs. Real-Time Systems, 1: 159 - 176, 1989.","journal-title":"Real-Time Systems"},{"key":"60_CR20","first-page":"1998","volume-title":"[Sch98] J\u00f6rn Schneider. Statische Pipeline-Analyse f\u00fcr Echtzeitsysteme. Dipl. Thesis","author":"CY Park","year":"1991","unstructured":"C. Y. Park and A. C. Shaw. Experiments with a Program Timing Tool Based on Source-Level Timing Schema. IEEE Computer, 24(5):48-57, May 1991. [Sch98] J\u00f6rn Schneider. Statische Pipeline-Analyse f\u00fcr Echtzeitsysteme. Dipl. Thesis, Universit\u00e4t des Saarlandes, October 1998."},{"key":"60_CR21","doi-asserted-by":"crossref","unstructured":"J. Schneider and C. Ferdinand. Pipeline behavior prediction for superscalar processors. Technical Report A\/02\/99, Uni. d. Saarlandes, February 1999.","DOI":"10.1145\/314403.314432"},{"key":"60_CR22","volume-title":"Dipl","author":"Martin Sicks. Adre\u00dfbestimmung zur Vorhersage des Verhaltens von Daten-Caches","year":"1997","unstructured":"Martin Sicks. Adre\u00dfbestimmung zur Vorhersage des Verhaltens von Daten-Caches. Dipl. Thesis, Uni. d. Saarlandes, 1997."},{"key":"60_CR23","first-page":"144","volume-title":"Rtss","author":"H Theiling","year":"1998","unstructured":"H. Theiling and C. Ferdinand. Combining Abstract Interpretation and ILP for Microarchitecture Modelling and Program Path Analysis. In RTSS, pages 144 - 153, Madrid, Spain, December 1998."},{"key":"60_CR24","volume-title":"\u00dcber die Verwendung ganzzahliger linearer Programmierung zur Suche nach l\u00e4ngsten Programmpfaden. Dipl","author":"H Theiling","year":"1998","unstructured":"H. Theiling. \u00dcber die Verwendung ganzzahliger linearer Programmierung zur Suche nach l\u00e4ngsten Programmpfaden. Dipl. Thesis, Uni. d. Saarlandes, Sep. 1998."},{"key":"60_CR25","volume-title":"Compiler Design. International Computer Science Series","author":"R Wilhelm","year":"1995","unstructured":"R. Wilhelm and D. Maurer. Compiler Design. International Computer Science Series. Addison-Wesley, 1995. Second Printing."}],"container-title":["Informatik aktuell","Informatik\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-01069-3_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T09:52:10Z","timestamp":1557827530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-01069-3_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664505","9783662010693"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-01069-3_60","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[1999]]}}}