{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T06:16:34Z","timestamp":1778220994057,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des Autom Embed Syst"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10617-023-09281-9","type":"journal-article","created":{"date-parts":[[2023,12,31]],"date-time":"2023-12-31T07:01:37Z","timestamp":1704006097000},"page":"275-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On the impact of hardware-related events on the execution of real-time programs"],"prefix":"10.1007","volume":"27","author":[{"given":"Tadeu Nogueira C.","family":"Andrade","sequence":"first","affiliation":[]},{"given":"George","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Veronica Maria Cadena","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Slim","family":"Bem-Amor","sequence":"additional","affiliation":[]},{"given":"Ismail","family":"Hawila","sequence":"additional","affiliation":[]},{"given":"Liliana","family":"Cucu-Grosjean","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,31]]},"reference":[{"issue":"3","key":"9281_CR1","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/s11241-021-09376-1","volume":"58","author":"B Akesson","year":"2022","unstructured":"Akesson B, Nasri M, Nelissen G, Altmeyer S, Davis RI (2022) A comprehensive survey of industry practice in real-time systems. Real Time Syst 58(3):358\u2013398. https:\/\/doi.org\/10.1007\/s11241-021-09376-1","journal-title":"Real Time Syst"},{"issue":"3","key":"9281_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1347375.1347389","volume":"7","author":"R Wilhelm","year":"2008","unstructured":"Wilhelm R, Engblom J, Ermedahl A, Holsti N, Thesing S, Whalley D, Bernat G, Ferdinand C, Heckmann R, Mitra T, Mueller F, Puaut I, Puschner P, Staschulat J, Stenstr\u00f6m P (2008) The worst-case execution-time problem: overview of methods and survey of tools. ACM Trans Embed Comput Syst 7(3):36\u201313653. https:\/\/doi.org\/10.1145\/1347375.1347389","journal-title":"ACM Trans Embed Comput Syst"},{"key":"9281_CR3","doi-asserted-by":"publisher","first-page":"100230","DOI":"10.1016\/j.iot.2020.100230","volume":"11","author":"H Li","year":"2020","unstructured":"Li H, De Meulenaere P, Vanherpen K, Mercelis S, Hellinckx P (2020) A hybrid timing analysis method based on the isolation of software code block. Internet Things 11:100230. https:\/\/doi.org\/10.1016\/j.iot.2020.100230","journal-title":"Internet Things"},{"issue":"6","key":"9281_CR4","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/TC.2018.2890626","volume":"68","author":"S Milutinovic","year":"2019","unstructured":"Milutinovic S, Mezzetti E, Abella J, Cazorla FJ (2019) Increasing the reliability of software timing analysis for cache-based processors. IEEE Trans Comput 68(6):836\u2013851. https:\/\/doi.org\/10.1109\/TC.2018.2890626","journal-title":"IEEE Trans Comput"},{"key":"9281_CR5","doi-asserted-by":"publisher","first-page":"103135","DOI":"10.1016\/j.micpro.2020.103135","volume":"77","author":"F Reghenzani","year":"2020","unstructured":"Reghenzani F, Massari G, Fornaciari W (2020) Probabilistic-wcet reliability: statistical testing of evt hypotheses. Microprocess Microsyst 77:103135. https:\/\/doi.org\/10.1016\/j.micpro.2020.103135","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"9281_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/3631483.3631502","volume":"43","author":"I Rodriguez Ferrandez","year":"2023","unstructured":"Rodriguez Ferrandez I, Jover Alvarez A, Maria Trompouki M, Kosmidis L, Cazorla FJ (2023) Worst case execution time and power estimation of multicore and gpu software: a pedestrian detection use case. ACM SIGAda Ada Lett 43(1):111\u2013117. https:\/\/doi.org\/10.1145\/3631483.3631502","journal-title":"ACM SIGAda Ada Lett"},{"issue":"1","key":"9281_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4230\/LITES-v006-i001-a003","volume":"6","author":"R Davis","year":"2019","unstructured":"Davis R, Cucu-Grosjean L (2019) A survey of probabilistic timing analysis techniques for real-time systems. LITES Leibniz Trans Embed Syst 6(1):1\u201360. https:\/\/doi.org\/10.4230\/LITES-v006-i001-a003","journal-title":"LITES Leibniz Trans Embed Syst"},{"key":"9281_CR8","doi-asserted-by":"publisher","DOI":"10.1145\/3301283","author":"FJ Cazorla","year":"2019","unstructured":"Cazorla FJ, Kosmidis L, Mezzetti E, Hernandez C, Abella J, Vardanega T (2019) Probabilistic worst-case timing analysis: taxonomy and comprehensive survey. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3301283","journal-title":"ACM Comput Surv"},{"key":"9281_CR9","doi-asserted-by":"publisher","unstructured":"Lima G, Dias D, Barros E (2016) Extreme value theory for estimating task execution time bounds: a careful look, pp 200\u2013211. https:\/\/doi.org\/10.1109\/ECRTS.2016.20","DOI":"10.1109\/ECRTS.2016.20"},{"issue":"3","key":"9281_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/LES.2017.2712858","volume":"9","author":"S Jim\u00e9nez Gil","year":"2017","unstructured":"Jim\u00e9nez Gil S, Bate I, Lima G, Santinelli L, Gogonel A, Cucu-Grosjean L (2017) Open challenges for probabilistic measurement-based worst-case execution time. IEEE Embed Syst Lett 9(3):69\u201372. https:\/\/doi.org\/10.1109\/LES.2017.2712858","journal-title":"IEEE Embed Syst Lett"},{"key":"9281_CR11","doi-asserted-by":"publisher","unstructured":"Barros\u00a0Vasconcelos J, Lima G (2022) Possible risks with evt-based timing analysis: an experimental study on a multi-core platform. In: 2022 XII Brazilian symposium on computing systems engineering (SBESC), pp 1\u20138. https:\/\/doi.org\/10.1109\/SBESC56799.2022.9964853","DOI":"10.1109\/SBESC56799.2022.9964853"},{"key":"9281_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.procs.2022.12.010","volume":"215","author":"E Praveen Kumar","year":"2022","unstructured":"Praveen Kumar E, Priyanka S, Sudhakar T (2022) A review on vulnerabilities to modern processors and its mitigation for various variants. Procedia Comput Sci 215:91\u201397. https:\/\/doi.org\/10.1016\/j.procs.2022.12.010","journal-title":"Procedia Comput Sci"},{"key":"9281_CR13","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.jpdc.2022.09.002","volume":"171","author":"M Amaris","year":"2023","unstructured":"Amaris M, Camargo R, Cordeiro D, Goldman A, Trystram D (2023) Evaluating execution time predictions on gpu kernels using an analytical model and machine learning techniques. J Parallel Distrib Comput 171:66\u201378. https:\/\/doi.org\/10.1016\/j.jpdc.2022.09.002","journal-title":"J Parallel Distrib Comput"},{"key":"9281_CR14","doi-asserted-by":"publisher","unstructured":"Dongarra J, London K, Moore S, Mucci P, Terpstra D, You H, Zhou M (2003) Experiences and lessons learned with a portable interface to hardware performance counters. In: Proceedings international parallel and distributed processing symposium. https:\/\/doi.org\/10.1109\/IPDPS.2003.1213517","DOI":"10.1109\/IPDPS.2003.1213517"},{"key":"9281_CR15","doi-asserted-by":"publisher","unstructured":"Khazen MW, Zagalo K, Clarke H, Mezouak M, Abdedda\u00efm Y, Bar-Hen A, Ben-Amor S, Bennour R, Gogonel A, Kougblenou K, Sorel Y, Cucu-Grosjean L (2022) Work in progress: Kdbench - towards open source benchmarks for measurement-based multicore WCET estimators. In: 28th IEEE real-time and embedded technology and applications symposium, RTAS 2022, Milano, Italy, 4\u20136 May 2022, pp 309\u2013312. IEEE, Milano, Italy. https:\/\/doi.org\/10.1109\/RTAS54340.2022.00035","DOI":"10.1109\/RTAS54340.2022.00035"},{"key":"9281_CR16","unstructured":"Holding A (2016) ARM Cortex-A53 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0500\/latest\/"},{"key":"9281_CR17","doi-asserted-by":"publisher","unstructured":"Weaver V, McKee S (2008) Can hardware performance counters be trusted?, pp 141\u2013150. https:\/\/doi.org\/10.1109\/IISWC.2008.4636099","DOI":"10.1109\/IISWC.2008.4636099"},{"key":"9281_CR18","doi-asserted-by":"publisher","unstructured":"Imtiaz S, Danielsson J, Behnam M, Capannini G, Carlson J, J\u00e4gemar M (2021) Automatic platform-independent monitoring and ranking of hardware resource utilization. In: 2021 26th IEEE international conference on emerging technologies and factory automation (ETFA ), pp 1\u20138. https:\/\/doi.org\/10.1109\/ETFA45728.2021.9613506","DOI":"10.1109\/ETFA45728.2021.9613506"},{"key":"9281_CR19","doi-asserted-by":"publisher","unstructured":"Gustafsson J, Betts A, Ermedahl A, Lisper B (2010) The m\u00e4lardalen wcet benchmarks: past, present and future. In: Lisper B (ed) WCET. OASICS, vol 15, pp 136\u2013146. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany. https:\/\/doi.org\/10.4230\/OASIcs.WCET.2010.136","DOI":"10.4230\/OASIcs.WCET.2010.136"},{"key":"9281_CR20","volume-title":"Machine learning for absolute beginners: a plain English introduction (third edition)","author":"O Theobald","year":"2020","unstructured":"Theobald O (2020) Machine learning for absolute beginners: a plain English introduction (third edition), 6th edn. Scatterplot Press, London","edition":"6"},{"key":"9281_CR21","volume-title":"Machine learning for hackers","author":"D Conway","year":"2012","unstructured":"Conway D, White JM (2012) Machine learning for hackers. O\u2019Reilly Media, Sebastopol"},{"key":"9281_CR22","volume-title":"Pattern recognition and machine learning (information science and statistics)","author":"CM Bishop","year":"2006","unstructured":"Bishop CM (2006) Pattern recognition and machine learning (information science and statistics). Springer, Berlin"},{"issue":"4","key":"9281_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2560033","volume":"13","author":"P Axer","year":"2014","unstructured":"Axer P, Ernst R, Falk H, Girault A, Grund D, Guan N, Jonsson B, Marwedel P, Reineke J, Rochange C, Sebastian M, Hanxleden R, Wilhelm R, Yi W (2014) Building timing predictable embedded systems. ACM Trans Embed Comput Syst 13(4):82\u201318237. https:\/\/doi.org\/10.1145\/2560033","journal-title":"ACM Trans Embed Comput Syst"},{"key":"9281_CR24","unstructured":"Lesage B, Griffin D, Bate I, Soboczenski F (2017) Exploring and understanding multicore interference from observable factors. In: Dencker P, Klenk H, Keller HB, Pl\u00f6dererder E (eds) Automotive: safety and security 2017\u2014Sicherheit und Zuverl\u00e4ssigkeit F\u00fcr Automobile Informationstechnik, pp 75\u201388. Gesellschaft f\u00fcr Informatik, Bonn, Germany. https:\/\/dl.gi.de\/20.500.12116\/148"},{"key":"9281_CR25","doi-asserted-by":"publisher","DOI":"10.1145\/1531793.1531803","author":"R Azimi","year":"2009","unstructured":"Azimi R, Tam DK, Soares L, Stumm M (2009) Enhancing operating system support for multicore processors by using hardware performance monitoring. ACM SIGOPS Oper Syst Rev. https:\/\/doi.org\/10.1145\/1531793.1531803","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"9281_CR26","doi-asserted-by":"publisher","unstructured":"Malone C, Zahran M, Karri R (2011) Are hardware performance counters a cost effective way for integrity checking of programs. In: Proceedings of the sixth ACM workshop on scalable trusted computing. STC \u201911, pp 71\u201376. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2046582.2046596","DOI":"10.1145\/2046582.2046596"},{"key":"9281_CR27","doi-asserted-by":"publisher","unstructured":"Griffin D, Lesage B, Bate I, Soboczenski F, Davis RI (2017) Forecast-based interference: modelling multicore interference from observable factors. RTNS \u201917, pp 198\u2013207. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3139258.3139275","DOI":"10.1145\/3139258.3139275"},{"key":"9281_CR28","doi-asserted-by":"publisher","unstructured":"Andrade TNC, Lima G, Lima VMC, Abdedda\u00efm Y, Grosjean LC (2021) On the selection of relevant hardware events for explaining execution time behavior. In: 2021 XI Brazilian symposium on computing systems engineering (SBESC), pp 1\u20138. https:\/\/doi.org\/10.1109\/SBESC53686.2021.9628374","DOI":"10.1109\/SBESC53686.2021.9628374"},{"key":"9281_CR29","doi-asserted-by":"publisher","unstructured":"Zaparanuks D, Jovic M, Hauswirth M (2009) Accuracy of performance counter measurements. In: IEEE international symposium on performance analysis of systems and software, pp 23\u201332. https:\/\/doi.org\/10.1109\/ISPASS.2009.4919635","DOI":"10.1109\/ISPASS.2009.4919635"},{"key":"9281_CR30","doi-asserted-by":"publisher","unstructured":"Das S, Werner J, Antonakakis M, Polychronakis M, Monrose F (2019) Sok: the challenges, pitfalls, and perils of using hardware performance counters for security. In: 2019 IEEE symposium on security and privacy (SP), pp 20\u201338. https:\/\/doi.org\/10.1109\/SP.2019.00021","DOI":"10.1109\/SP.2019.00021"},{"key":"9281_CR31","doi-asserted-by":"publisher","unstructured":"Banerjee S, Jha S, Iyer R (2021) Bayesperf: minimizing performance monitoring errors using Bayesian statistics https:\/\/doi.org\/10.1145\/3445814.3446739","DOI":"10.1145\/3445814.3446739"},{"key":"9281_CR32","unstructured":"Meier L. PX4 Development Guide. https:\/\/dev.px4.io\/en\/"},{"key":"9281_CR33","unstructured":"Holding A (2021) ARM v7-M architecture application level reference manual. https:\/\/developer.arm.com\/documentation\/ddi0403\/latest\/"},{"key":"9281_CR34","unstructured":"Nuttx G. NuttX operating system, user\u2019s manual. http:\/\/www.nuttx.org\/doku.php?id=documentation:userguide"},{"issue":"1","key":"9281_CR35","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/321738.321743","volume":"20","author":"CL Liu","year":"1973","unstructured":"Liu CL, Layland JW (1973) Scheduling algorithms for multiprogramming in a hard real-time environment. J ACM 20(1):46\u201361. https:\/\/doi.org\/10.1145\/321738.321743","journal-title":"J ACM"},{"key":"9281_CR36","unstructured":"FOUNDATION RP. Raspberry Pi OS - Raspberry Documentation (2018). Accessed 24 July 2020. https:\/\/www.raspberrypi.org\/documentation\/raspbian\/"},{"key":"9281_CR37","unstructured":"Kerrisk M (2019) Perf event open: Linux manual page. https:\/\/linux.die.net\/man\/2\/perf_event_open"},{"key":"9281_CR38","doi-asserted-by":"publisher","unstructured":"Bechtel MG, Yun H (2019) Denial-of-service attacks on shared cache in multicore: analysis and prevention. https:\/\/doi.org\/10.48550\/arXiv.1903.01314","DOI":"10.48550\/arXiv.1903.01314"},{"key":"9281_CR39","volume-title":"Probability and statistics for engineering and the sciences","author":"JL Devore","year":"2011","unstructured":"Devore JL (2011) Probability and statistics for engineering and the sciences, 8th edn. Brooks\/Cole, Boston","edition":"8"},{"key":"9281_CR40","doi-asserted-by":"crossref","unstructured":"Vera X, Lisper B, Xue J (2003) Data cache locking for higher program predictability. In: International conference on measurement and modeling of computer systems (SIGMETRICS), pp 272\u2013282. http:\/\/www.es.mdh.se\/publications\/438-","DOI":"10.1145\/885651.781062"},{"key":"9281_CR41","doi-asserted-by":"publisher","unstructured":"Qui\u00f1ones E, Berger GBED, Cazorla FJ (2009) Using randomized caches in probabilistic real-time systems, pp 129\u2013138 https:\/\/doi.org\/10.1109\/ECRTS.2009.30","DOI":"10.1109\/ECRTS.2009.30"},{"key":"9281_CR42","doi-asserted-by":"publisher","unstructured":"Altmeyer S, Cucu-grosjean RDL (2015) Static probabilistic timing analysis for real-time systems using random replacement caches, pp 77\u2013123. https:\/\/doi.org\/10.1007\/s11241-014-9218-4","DOI":"10.1007\/s11241-014-9218-4"},{"key":"9281_CR43","unstructured":"R Core Team (2020) R: a language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. R Foundation for Statistical Computing. https:\/\/www.R-project.org\/"},{"key":"9281_CR44","volume-title":"Introduction to linear regression analysis","author":"DC Montgomery","year":"2006","unstructured":"Montgomery DC, Peck EA, Vining GG (2006) Introduction to linear regression analysis, 4th edn. Wiley, Hoboken","edition":"4"},{"key":"9281_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7","volume-title":"Ensemble machine learning: methods and applications","author":"C Zhang","year":"2012","unstructured":"Zhang C, Ma Y (2012) Ensemble machine learning: methods and applications, 1st edn. Springer, New York. https:\/\/doi.org\/10.1007\/978-1-4419-9326-7","edition":"1"},{"key":"9281_CR46","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach Learn"},{"issue":"3","key":"9281_CR47","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw A, Wiener M (2002) Classification and regression by randomforest. R News 2(3):18\u201322","journal-title":"R News"},{"key":"9281_CR48","unstructured":"Cannon AJ (2022) Multi-layer perceptron neural network with optional monotonicity constraints, Victoria, Canada. https:\/\/CRAN.R-project.org\/package=monmlp"},{"key":"9281_CR49","doi-asserted-by":"publisher","unstructured":"Chapter seven-architecture of neural processing unit for deep neural networks. In: Kim S, Deka GC (eds) Hardware accelerator systems for artificial intelligence and machine learning. Advances in computers, vol 122, pp 217\u2013245. Elsevier (2021). https:\/\/doi.org\/10.1016\/bs.adcom.2020.11.001","DOI":"10.1016\/bs.adcom.2020.11.001"},{"key":"9281_CR50","unstructured":"Candel A, LeDell E (2023) Deep Learning with H$$_2$$O. Mountain View, California. https:\/\/h2o.ai\/resources\/"},{"key":"9281_CR51","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-1-4302-5990-9_4","volume-title":"Support vector regression","author":"M Awad","year":"2015","unstructured":"Awad M, Khanna R (2015) Support vector regression. Apress, Berkeley, pp 67\u201380. https:\/\/doi.org\/10.1007\/978-1-4302-5990-9_4"},{"key":"9281_CR52","unstructured":"Meyer D, Dimitriadou E, Hornik K, Weingessel A, Leisch F (2023) E1071: misc functions of the Department of Statistics, Probability Theory Group (Formerly: E1071), TU Wien. R package version 1.7-13. https:\/\/CRAN.R-project.org\/package=e1071"},{"key":"9281_CR53","doi-asserted-by":"publisher","unstructured":"Kosmidis L, Abella J, Qui\u00f1ones E, Cazorla FJ (2013) A cache design for probabilistically analysable real-time systems. In: 2013 Design, automation test in Europe conference exhibition (DATE), pp 513\u2013518. https:\/\/doi.org\/10.7873\/DATE.2013.116","DOI":"10.7873\/DATE.2013.116"},{"key":"9281_CR54","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1023\/a:1008149332687","volume":"18","author":"A Colin","year":"2000","unstructured":"Colin A, Puaut I (2000) Worst case execution time analysis for a processor with branch prediction. Real Time Syst 18:249\u2013274. https:\/\/doi.org\/10.1023\/a:1008149332687","journal-title":"Real Time Syst"},{"key":"9281_CR55","doi-asserted-by":"publisher","unstructured":"Bate I, Reutemann R (2004) Worst-case execution time analysis for dynamic branch predictors. In: Proceedings. 16th Euromicro conference on real-time systems, 2004. ECRTS 2004, pp 215\u2013222. https:\/\/doi.org\/10.1109\/EMRTS.2004.1311023","DOI":"10.1109\/EMRTS.2004.1311023"},{"key":"9281_CR56","doi-asserted-by":"publisher","unstructured":"Burgui\u00e8re C, Rochange C (2005) A contribution to branch prediction modeling in wcet analysis, pp 612\u2013617. https:\/\/doi.org\/10.1109\/DATE.2005.7","DOI":"10.1109\/DATE.2005.7"}],"container-title":["Design Automation for Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10617-023-09281-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10617-023-09281-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10617-023-09281-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T17:05:43Z","timestamp":1706029543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10617-023-09281-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9281"],"URL":"https:\/\/doi.org\/10.1007\/s10617-023-09281-9","relation":{},"ISSN":["0929-5585","1572-8080"],"issn-type":[{"value":"0929-5585","type":"print"},{"value":"1572-8080","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"16 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}