{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:57Z","timestamp":1740141777471,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:00:00Z","timestamp":1672963200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:00:00Z","timestamp":1672963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100011688","name":"Electronic Components and Systems for European Leadership","doi-asserted-by":"publisher","award":["737475"],"award-info":[{"award-number":["737475"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10270-022-01076-z","type":"journal-article","created":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T07:10:32Z","timestamp":1672989032000},"page":"1519-1541","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Execution trace analysis for a precise understanding of latency violations"],"prefix":"10.1007","volume":"22","author":[{"given":"Maysam","family":"Zoor","sequence":"first","affiliation":[]},{"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[]},{"given":"Renaud","family":"Pacalet","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Coudert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,6]]},"reference":[{"key":"1076_CR1","doi-asserted-by":"crossref","unstructured":"Aboussoror, El\u00a0Arbi., Ober, Ileana., Ober, Iulian.: Significantly increasing the usability of model analysis tools through visual feedback. In International SDL Forum, pages 107\u2013123. Springer, (2013)","DOI":"10.1007\/978-3-642-38911-5_7"},{"key":"1076_CR2","unstructured":"Aggregated quality assurance for systems (aquas). https:\/\/aquas-project.eu, 2013. Accessed: 2019-09-24"},{"issue":"1","key":"1076_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3437537","volume":"2","author":"N Alhirabi","year":"2021","unstructured":"Alhirabi, N., Rana, O., Perera, C.: Security and privacy requirements for the internet of things: a survey. ACM Trans. Internet of Things 2(1), 1\u201337 (2021)","journal-title":"ACM Trans. Internet of Things"},{"key":"1076_CR4","doi-asserted-by":"crossref","unstructured":"Apvrille, L., Li, L.\u00a0W.: Harmonizing safety, security and performance requirements in embedded systems. In Design, Automation and Test in Europe (DATE\u20192019), Florence, Italy, (2019)","DOI":"10.23919\/DATE.2019.8715124"},{"key":"1076_CR5","unstructured":"Apvrille, L., Roudier, Y.: SysML-Sec: A SysML environment for the design and development of secure embedded systems, pp. 8\u201311. APCOSEC, Asia-Pacific Council on Systems Engineering (2013)"},{"issue":"2","key":"1076_CR6","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/12.663776","volume":"47","author":"M Barbehenn","year":"1998","unstructured":"Barbehenn, M.: A note on the complexity of dijkstra\u2019s algorithm for graphs with weighted vertices. IEEE Trans. Computers 47(2), 263 (1998)","journal-title":"IEEE Trans. Computers"},{"key":"1076_CR7","doi-asserted-by":"crossref","unstructured":"Baumeister, J., Finkbeiner, B., Schirmer, S., Schwenger, M., Torens, C.: Rtlola cleared for take-off: monitoring autonomous aircraft. In International Conference on Computer Aided Verification, pages 28\u201339. Springer, (2020)","DOI":"10.1007\/978-3-030-53291-8_3"},{"key":"1076_CR8","unstructured":"Blein, Y.: ParTraP: A Language for the Specification and Runtime Verification of Parametric Properties. PhD thesis, Universit\u00e9 Grenoble Alpes, (2019)"},{"key":"1076_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sysarc.2016.12.009","volume":"77","author":"J Brandenburg","year":"2017","unstructured":"Brandenburg, J., Stabernack, B.: Simulation-based hw\/sw co-exploration of the concurrent execution of hevc intra encoding algorithms for heterogeneous multi-core architectures. J. Syst. Arch. 77, 26\u201342 (2017)","journal-title":"J. Syst. Arch."},{"key":"1076_CR10","doi-asserted-by":"crossref","unstructured":"Buchmann, R., P\u00e9trot, F., Greiner, A.: Fast cycle accurate simulator to simulate event-driven behavior. In International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC\u201904., pages 35\u201338. IEEE, (2004)","DOI":"10.1109\/ICEEC.2004.1374374"},{"key":"1076_CR11","doi-asserted-by":"crossref","unstructured":"Chen, X., Hsieh, H., Felice B., and Yosinori W.: Automatic trace analysis for logic of constraints. In Proceedings of the 40th annual Design Automation Conference, pages 460\u2013465, (2003)","DOI":"10.1145\/775832.775952"},{"issue":"8","key":"1076_CR12","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/TCAD.2004.831575","volume":"23","author":"X Chen","year":"2004","unstructured":"Chen, X., Hsieh, H., Balarin, F., Watanabe, Y.: Logic of constraints: a quantitative performance and functional constraint formalism. IEEE Trans. Computer-Aided Des. Integr. Circuits Syst. 23(8), 1243\u20131255 (2004)","journal-title":"IEEE Trans. Computer-Aided Des. Integr. Circuits Syst."},{"issue":"1","key":"1076_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10766-005-0002-x","volume":"34","author":"X Chen","year":"2006","unstructured":"Chen, X., Hsieh, H., Balarin, F.: Verification approach of metropolis design framework for embedded systems. Int. J. Parallel Program. 34(1), 3\u201327 (2006)","journal-title":"Int. J. Parallel Program."},{"key":"1076_CR14","doi-asserted-by":"crossref","unstructured":"Coen-Porisini, A., Denaro, G., Ghezzi, C., Pezz\u00e9, M.: Using symbolic execution for verifying safety-critical systems. In Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 142\u2013151, (2001)","DOI":"10.1145\/503209.503230"},{"key":"1076_CR15","doi-asserted-by":"crossref","unstructured":"Convent, L., Hungerecker, S., Leucker, M., Scheffel, T., Schmitz, M., Thoma, D.: Tessla: temporal stream-based specification language. In Brazilian Symposium on Formal Methods, pages 144\u2013162. Springer, (2018)","DOI":"10.1007\/978-3-030-03044-5_10"},{"issue":"1","key":"1076_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10766-005-0004-8","volume":"34","author":"D Currie","year":"2006","unstructured":"Currie, D., Feng, X., Fujita, M., Hu, Alan J. K., Mark, R.S.: Embedded software verification using symbolic execution and uninterpreted functions. Int. J. Parallel Program. 34(1), 61\u201391 (2006)","journal-title":"Int. J. Parallel Program."},{"key":"1076_CR17","unstructured":"d\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C.: Will Robinson, Bernd Finkbeiner, Henny\u00a0B Sipma, Sandeep Mehrotra, and Zohar Manna. Lola: runtime monitoring of synchronous systems. In 12th International Symposium on Temporal Representation and Reasoning (TIME\u201905), pages 166\u2013174. IEEE, (2005)"},{"key":"1076_CR18","unstructured":"Dawes, J\u00a0H.: Towards automated performance analysis of programs by runtime verification. PhD thesis, Manchester U., (2021)"},{"key":"1076_CR19","doi-asserted-by":"crossref","unstructured":"DeAntoni, J., Mallet, F., Thomas, F., Reydet, G., Babau, J-P., Mraidha, C., Gauthier, L., Rioux, L., Sordon, N.: Rt-simex: retro-analysis of execution traces. In Proceedings of the eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 377\u2013378, (2010)","DOI":"10.1145\/1882291.1882357"},{"key":"1076_CR20","doi-asserted-by":"crossref","unstructured":"DeAntoni, J., Mallet, F.: Timesquare: Treat your models with logical time. In International Conference on Modelling Techniques and Tools for Computer Performance Evaluation, pages 34\u201341. Springer, (2012)","DOI":"10.1007\/978-3-642-30561-0_4"},{"key":"1076_CR21","unstructured":"Deantoni, J.: Towards formal system modeling: making explicit and formal the concurrent and timed operational semantics to better understand heterogeneous models. PhD thesis, Universit\u00e9 C\u00f4te d\u2019Azur, CNRS, I3S, France, (2019)"},{"key":"1076_CR22","unstructured":"Enrici, A., Li, L., Apvrille, L., Blouin, D.: A tutorial on ttool. DIPLODOCUS: an open-source toolkit for the design of data-flow embedded systems, (2018)"},{"key":"1076_CR23","first-page":"141","volume":"25","author":"Y Falcone","year":"2013","unstructured":"Falcone, Y., Havelund, K., Reger, G.: A tutorial on runtime verification. Eng Dependable Softw Syst 25, 141\u2013175 (2013)","journal-title":"Eng Dependable Softw Syst"},{"issue":"2","key":"1076_CR24","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10009-021-00609-z","volume":"23","author":"Y Falcone","year":"2021","unstructured":"Falcone, Y., Krsti\u0107, S., Reger, G., Traytel, D.: A taxonomy for classifying runtime verification tools. Int. J. Softw. Tools Technol. Transf. 23(2), 255\u2013284 (2021)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"1","key":"1076_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10458-020-09487-2","volume":"35","author":"M Fisher","year":"2021","unstructured":"Fisher, M., Mascardi, V., Rozier, K.Y., Schlingloff, B.-H., Winikoff, M., Yorke-Smith, N.: Towards a framework for certification of reliable autonomous systems. Autonomous Agents Multi-Agent Syst. 35(1), 1\u201365 (2021)","journal-title":"Autonomous Agents Multi-Agent Syst."},{"key":"1076_CR26","doi-asserted-by":"crossref","unstructured":"Fujdiak, R., Mlynek, P., Blazek, P., Barabas, M., Mrnustik, P.: Seeking the relation between performance and security in modern systems: Metrics and measures. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP), pages 1\u20135. IEEE, (2018)","DOI":"10.1109\/TSP.2018.8441496"},{"key":"1076_CR27","unstructured":"Gordon, DM., Kemper, P.: On clustering simulation traces. In Proceedings Eighth International Workshop on Performability Modelling of Computer and Communication Systems (PMCCS-8: Edinburgh, p. 2007. Scotland, UK (2007)"},{"key":"1076_CR28","doi-asserted-by":"crossref","unstructured":"Gruber, T., Schmittner, C., Matschnig, M., Fischer, B.: Co-engineering-in-the-loop. In International Conference on Computer Safety, Reliability, and Security, pages 151\u2013163. Springer, (2018)","DOI":"10.1007\/978-3-319-99229-7_14"},{"key":"1076_CR29","doi-asserted-by":"crossref","unstructured":"Hedde, D., P\u00e9trot, F.: A non intrusive simulation-based trace system to analyse multiprocessor systems-on-chip software. In 2011 22nd IEEE International Symposium on Rapid System Prototyping, pages 106\u2013112. IEEE, (2011)","DOI":"10.1109\/RSP.2011.5929983"},{"issue":"6","key":"1076_CR30","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.1007\/s10270-019-00724-1","volume":"18","author":"F Hojaji","year":"2019","unstructured":"Hojaji, F., Mayerhofer, T., Zamani, B., Hamou-Lhadj, A., Bousse, E.: Model execution tracing: a systematic mapping study. Softw. Syst. Model. 18(6), 3461\u20133485 (2019)","journal-title":"Softw. Syst. Model."},{"key":"1076_CR31","doi-asserted-by":"crossref","unstructured":"Iegorov, O., Leroy, V., Termier, A., M\u00e9haut, J-F., Santana, M.: Data mining approach to temporal debugging of embedded streaming applications. In 2015 International Conference on Embedded Software (EMSOFT), pages 167\u2013176. IEEE, (2015)","DOI":"10.1109\/EMSOFT.2015.7318272"},{"key":"1076_CR32","doi-asserted-by":"crossref","unstructured":"Kangas, T., Kukkala, P., Orsila, H., Salminen, E., H\u00e4nnik\u00e4inen, M., H\u00e4m\u00e4l\u00e4inen, T\u00a0D., Riihim\u00e4ki, J., Kuusilinna, K.: Uml-based multiprocessor soc design framework. ACM Transactions on Embedded Computing Systems (TECS), 5(2):281\u2013320, (2006)","DOI":"10.1145\/1151074.1151077"},{"key":"1076_CR33","doi-asserted-by":"crossref","unstructured":"Kemper, P., Tepper, C.: Automated analysis of simulation traces-separating progress from repetitive behavior. In Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007), pages 101\u2013110. IEEE, (2007)","DOI":"10.1109\/QEST.2007.41"},{"key":"1076_CR34","unstructured":"Kemper, P., Tepper, C.: Trace based analysis of process interaction models. In Proceedings of the Winter Simulation Conference, 2005., pages 10\u2013pp. IEEE, (2005)"},{"key":"1076_CR35","unstructured":"Kemper, V., Tepper, C.: Trace analysis-gain insight through modelchecking and cycle reduction. Technical report, SFB 559, (2006)"},{"key":"1076_CR36","doi-asserted-by":"crossref","unstructured":"Kienhuis, B., Deprettere, E\u00a0F., Van\u00a0der Wolf, P., Vissers, K.: A methodology to design programmable embedded systems. In International Workshop on Embedded Computer Systems, pages 18\u201337. Springer, (2001)","DOI":"10.1007\/3-540-45874-3_2"},{"key":"1076_CR37","doi-asserted-by":"crossref","unstructured":"Kienhuis, B.,\u00a0Deprettere, F., van\u00a0der Wolf, P., Vissers, K.: The y-chart approach. In Embedded processor design challenges, page\u00a018. Springer, (2002)","DOI":"10.1007\/3-540-45874-3_2"},{"issue":"7","key":"1076_CR38","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"key":"1076_CR39","doi-asserted-by":"crossref","unstructured":"Knorreck, D., Apvrille, L., Pacalet, R.: Fast simulation techniques for design space exploration. In International Conference on Objects, Components, Models and Patterns, pages 308\u2013327. Springer, (2009)","DOI":"10.1007\/978-3-642-02571-6_18"},{"key":"1076_CR40","doi-asserted-by":"crossref","unstructured":"Kuck, D.\u00a0J., Kuhn, R.\u00a0H., Padua, D.\u00a0A.,\u00a0Leasure, B.,\u00a0Wolfe, M.: Dependence graphs and compiler optimizations. In Proceedings of the 8th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL \u201981, page 207-218, New York, NY, USA, 1981. Association for Computing Machinery","DOI":"10.1145\/567532.567555"},{"key":"1076_CR41","unstructured":"Malan, R., Bredemeyer, D.: Defining non-functional requirements, (2001)"},{"key":"1076_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60910-8_5","volume-title":"Evaluation and validation","author":"P Marwedel","year":"2021","unstructured":"Marwedel, P.: Evaluation and validation. Springer International Publishing, Cham (2021)"},{"key":"1076_CR43","unstructured":"Matovi\u0107, A.: Case studies on modeling security implications on safety. Independent thesis Advanced level (degree of Master (One Year)), Malardalen University, School of Innovation, Design and Engineering., (2019)"},{"key":"1076_CR44","doi-asserted-by":"crossref","unstructured":"Pagano, G., Dosimont, D., Huard, G., Marangozova-Martin, V., Vincent, J-M.: Trace management and analysis for embedded systems. In 2013 IEEE 7th International Symposium on Embedded Multicore Socs, pages 119\u2013122. IEEE, (2013)","DOI":"10.1109\/MCSoC.2013.28"},{"key":"1076_CR45","doi-asserted-by":"crossref","unstructured":"Pagano, G., Marangozova-Martin, V.: Soc-trace infrastructure. (2012)","DOI":"10.1145\/2405153.2405163"},{"key":"1076_CR46","unstructured":"Perez, I., Dedden, F., Goodloe, A.: Copilot 3. Technical report, Technical Report NASA\/TM-2020-220587, National Aeronautics and Space\u00a0..., (2020)"},{"key":"1076_CR47","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.micpro.2019.05.013","volume":"69","author":"L Pomante","year":"2019","unstructured":"Pomante, L., Muttillo, V., Krena, B., Vojnar, T., Veljkovic, F., Magnin, P., Matschnig, M., Fischer, B., Martinez, J., Gruber, T.: The AQUAS ECSEL project aggregated quality assurance for systems: co-engineering inside and across the product life cycle. Microprocess. Microsyst. 69, 54\u201367 (2019)","journal-title":"Microprocess. Microsyst."},{"key":"1076_CR48","unstructured":"Retro-ing\u00e9nerie de traces d\u2019analyse de simulation et d\u2019ex\u00e9cution de syst\u00e8mes temps-r\u00e9el \u2013 rt-simex. https:\/\/anr.fr\/Projet-ANR-08-SEGI-0015, 2013. Accessed: 2019-09-24"},{"key":"1076_CR49","doi-asserted-by":"crossref","unstructured":"Rozier, K\u00a0Y.: From simulation to runtime verification and back: Connecting single-run verification techniques. In 2019 Spring Simulation Conference (SpringSim), pages 1\u201310. IEEE, (2019)","DOI":"10.23919\/SpringSim.2019.8732915"},{"key":"1076_CR50","doi-asserted-by":"crossref","unstructured":"Tepper, G.,\u00a0Kemper, P.: Traviando-debugging simulation traces with message sequence charts. In Third International Conference on the Quantitative Evaluation of Systems-(QEST\u201906), pages 135\u2013136. IEEE, (2006)","DOI":"10.1109\/QEST.2006.58"},{"key":"1076_CR51","unstructured":"TTool, 2013"},{"issue":"3","key":"1076_CR52","doi-asserted-by":"publisher","first-page":"143201","DOI":"10.1007\/s11704-018-7217-7","volume":"14","author":"D Yue","year":"2020","unstructured":"Yue, D., Joloboff, V., Mallet, F.: Trap: trace runtime analysis of properties. Front. Computer Sci. 14(3), 143201 (2020)","journal-title":"Front. Computer Sci."},{"issue":"5","key":"1076_CR53","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TCAD.2016.2523937","volume":"35","author":"B Zheng","year":"2016","unstructured":"Zheng, B., Deng, P., Anguluri, R., Zhu, Q., Pasqualetti, F.: Cross-layer codesign for secure cyber-physical systems. IEEE Trans. Computer-Aided Des. Integr. Circuits Syst. 35(5), 699\u2013711 (2016)","journal-title":"IEEE Trans. Computer-Aided Des. Integr. Circuits Syst."},{"key":"1076_CR54","doi-asserted-by":"crossref","unstructured":"Zoor, M., Apvrille, L., Pacalet, R.: Execution trace analysis for a precise understanding of latency violations. In 2021 ACM\/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS), pages 123\u2013133. IEEE, (2021)","DOI":"10.1109\/MODELS50736.2021.00021"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-022-01076-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-022-01076-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-022-01076-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T19:11:24Z","timestamp":1728673884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-022-01076-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,6]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1076"],"URL":"https:\/\/doi.org\/10.1007\/s10270-022-01076-z","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2023,1,6]]},"assertion":[{"value":"15 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}