{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:14:27Z","timestamp":1742987667805,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225307"},{"type":"electronic","value":"9783642225314"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22531-4_6","type":"book-chapter","created":{"date-parts":[[2011,7,14]],"date-time":"2011-07-14T03:34:11Z","timestamp":1310614451000},"page":"86-103","source":"Crossref","is-referenced-by-count":2,"title":["A Functional Approach to Worst-Case Execution Time Analysis"],"prefix":"10.1007","author":[{"given":"V\u00edtor","family":"Rodrigues","sequence":"first","affiliation":[]},{"given":"M\u00e1rio","family":"Florido","sequence":"additional","affiliation":[]},{"given":"Sim\u00e3o Melo","family":"de Sousa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"AbsInt. Angewandte informatik., http:\/\/www.absint.com\/pag\/"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/BFb0039704","volume-title":"Formal Methods in Programming and Their Applications","author":"F. Bourdoncle","year":"1993","unstructured":"Bourdoncle, F.: Efficient chaotic iteration strategies with widenings. In: Pottosin, I.V., Bjorner, D., Broy, M. (eds.) FMP&TA 1993. LNCS, vol.\u00a0735, pp. 128\u2013141. Springer, Heidelberg (1993)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-78769-3_7","volume-title":"Logic-Based Program Synthesis and Transformation","author":"B. Brassel","year":"2008","unstructured":"Brassel, B., Christiansen, J.: Denotation by Transformation. In: King, A. (ed.) LOPSTR 2007. LNCS, vol.\u00a04915, pp. 90\u2013105. Springer, Heidelberg (2008)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Cousot, P.: Constructive design of a hierarchy of semantics of a transition system by abstract interpretation. Electronic Notes in Theoretical Computer Science\u00a06 (1997)","DOI":"10.1016\/S1571-0661(05)80168-9"},{"key":"6_CR5","unstructured":"Cousot, P.: The calculational design of a generic abstract interpreter. In: Broy, M., Steinbr\u00fcggen, R. (eds.) Calculational System Design. NATO ASI Series F. IOS Press, Amsterdam (1999)"},{"key":"6_CR6","unstructured":"Cousot, P., Cousot, R.: Static determination of dynamic properties of programs. In: Proceedings of the Second International Symposium on Programming, Dunod, Paris, France, pp. 106\u2013130 (1976)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1298","DOI":"10.1007\/BFb0002886","volume-title":"Euro-Par \u201997 Parallel Processing","author":"A. Ermedahl","year":"1997","unstructured":"Ermedahl, A., Gustafsson, J.: Deriving annotations for tight calculation of execution time. In: Lengauer, C., Griebl, M., Gorlatch, S. (eds.) Euro-Par 1997. LNCS, vol.\u00a01300, pp. 1298\u20131307. Springer, Heidelberg (1997)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0167-6423(99)00010-6","volume":"35","author":"C. Ferdinand","year":"1999","unstructured":"Ferdinand, C., Martin, F., Wilhelm, R., Alt, M.: Cache behavior prediction by abstract interpretation. Sci. Comput. Program.\u00a035, 163\u2013189 (1999)","journal-title":"Sci. Comput. Program."},{"key":"6_CR9","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1093\/oso\/9780198537809.003.0005","volume-title":"Handbook of Logic in Computer Science","author":"N.D. Jones","year":"1995","unstructured":"Jones, N.D., Nielson, F.: Abstract interpretation: a semantics-based tool for program analysis. In: Handbook of Logic in Computer Science: Semantic Modelling, vol.\u00a04, pp. 527\u2013636. Oxford University Press, Oxford (1995)"},{"key":"6_CR10","unstructured":"Lacan, P., Monfort, J.N., Ribal, L.V.Q., Deutsch, A., Gonthier, G.: ARIANE 5 - The Software Reliability Verification Process. In: DASIA 1998 - Data Systems in Aerospace. ESA Special Publication, vol.\u00a0422 (May 1998)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Li, Y.-T.S., Malik, S., Wolfe, A.: Cache modeling for real-time software: beyond direct mapped instruction caches. In: IEEE Real-Time Systems Symposium, pp. 254\u2013263 (1996)","DOI":"10.1109\/REAL.1996.563722"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"ESOP 86","author":"H.R. Nielson","year":"1986","unstructured":"Nielson, H.R., Nielson, F.: Pragmatic aspects of two-level denotational meta-languages. In: Robinet, B., Wilhelm, R. (eds.) ESOP 1986. LNCS, vol.\u00a0213, Springer, Heidelberg (1986)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Patankar, V.A., Jain, A., Bryant, R.E.: Formal verification of an arm processor. In: Twelfth International Conference On VLSI Design, pp. 282\u2013287 (1999)","DOI":"10.1109\/ICVD.1999.745161"},{"key":"6_CR14","unstructured":"Plazar, S., Lokuciejewski, P., Marwedel, P.: A Retargetable Framework for Multi-objective WCET-aware High-level Compiler Optimizations. In: Proceedings of The 29th IEEE Real-Time Systems Symposium (RTSS) WiP, Barcelona, Spain, pp. 49\u201352 (December 2008)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/315253.314432","volume":"34","author":"J. Schneider","year":"1999","unstructured":"Schneider, J., Ferdinand, C.: Pipeline behavior prediction for superscalar processors by abstract interpretation. SIGPLAN Not.\u00a034, 35\u201344 (1999)","journal-title":"SIGPLAN Not."},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-70545-1_6","volume-title":"Computer Aided Verification","author":"R. Wilhelm","year":"2008","unstructured":"Wilhelm, R., Wachter, B.: Abstract Interpretation with Applications to Timing Validation. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 22\u201336. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Functional and Constraint Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22531-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T18:27:20Z","timestamp":1712600840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22531-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225307","9783642225314"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22531-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}