{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:02:33Z","timestamp":1752537753142,"version":"3.41.2"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2000,2,1]],"date-time":"2000-02-01T00:00:00Z","timestamp":949363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,2,1]],"date-time":"2000-02-01T00:00:00Z","timestamp":949363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Design Automation for Embedded Systems"],"published-print":{"date-parts":[[2000,2]]},"DOI":"10.1023\/a:1008991500612","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T12:46:35Z","timestamp":1040561195000},"page":"61-81","source":"Crossref","is-referenced-by-count":7,"title":["Assessing Probabilistic Timing Constraints on System Performance"],"prefix":"10.1007","volume":"5","author":[{"given":"G.","family":"de Veciana","sequence":"first","affiliation":[]},{"given":"M.","family":"Jacome","sequence":"additional","affiliation":[]},{"given":"Jian-Huei","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"250897_CR1","unstructured":"Bertsekas, D. 1995. Dynamic Programming and Optimal Control, volume 1. Athena Scientific."},{"issue":"5","key":"250897_CR2","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/76.473548","volume":"5","author":"V. Bhaskaran","year":"1995","unstructured":"Bhaskaran, V., Konstantinides, K., Lee, R., and Beck, J. 1995. Algorithmic and architectural enhancements for real-time MPEG-1 decoding on a general purpose risc workstation. IEEE Trans. Circ. & Syst. Video Tech. 5(5):380\u2013386.","journal-title":"IEEE Trans. Circ. & Syst. Video Tech."},{"key":"250897_CR3","unstructured":"Cormen, T., Leiserson, C., and Rivest, R. 1990. Introduction to Algorithms The MIT Press."},{"key":"250897_CR4","unstructured":"de Micheli, G. 1994. Synthesis and Optimization of Digital Ciruits. McGraw-Hill, Inc."},{"key":"250897_CR5","volume-title":"Large Deviations Techniques and Applications","author":"A. Dembo","year":"1992","unstructured":"Dembo, A., and Zeitouni, O. 1992. Large Deviations Techniques and Applications. Boston: Jones & Bartlett."},{"key":"250897_CR6","unstructured":"Feller, W. 1971. An Introduction to Probability Theory and Its Applications, volume 1\u20132. J. Wiley & Sons."},{"issue":"6","key":"250897_CR7","doi-asserted-by":"crossref","first-page":"808","DOI":"10.1287\/opre.10.6.808","volume":"10","author":"D. Flukerson","year":"1962","unstructured":"Flukerson, D. 1962. Expected critical path lenghts in PERT networks. Oper. Res 10(6):808\u2013817.","journal-title":"Oper. Res"},{"key":"250897_CR8","unstructured":"Gajski, D., Vahid, F., Narayan, S., and Gong, J. 1994. Specification and Design Of Embedded Systems. PTR Prentice Hall."},{"key":"250897_CR9","unstructured":"Gu\u00e9rin, R., and Orda, A. 1996. QoS-based routing in networks with inaccurate information: theory and algorithms. IBM Research Report 20515."},{"key":"250897_CR10","doi-asserted-by":"crossref","unstructured":"Gupta, R. 1995. Co-synthsis of Hardware and Software for Digital Embedded Systems. Kluwer Academic.","DOI":"10.1007\/978-1-4615-2287-4"},{"key":"250897_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, R., and De Micheli, G. 1993. Hardware-software cosynthesis for digital systems. IEEE Design & Test of Computers 10(3).","DOI":"10.1109\/54.232470"},{"key":"250897_CR12","doi-asserted-by":"crossref","unstructured":"Hsu, I., and Walrand, J. 1994. Admission control for ATM networks. Proc. IMA Workshop on Stochastic Networks.","DOI":"10.1007\/978-1-4757-2418-9_21"},{"key":"250897_CR13","unstructured":"Kall, P., and Wallace, S. 1994. Stochastic Programming. John Wiley and Sons."},{"key":"250897_CR14","doi-asserted-by":"crossref","unstructured":"Kavi, K., and Bukles, B. 1986. A formal definition of data flow graph models. IEEE Trans. Computers C-35(11).","DOI":"10.1109\/TC.1986.1676696"},{"key":"250897_CR15","doi-asserted-by":"crossref","first-page":"1586","DOI":"10.1287\/opre.19.7.1586","volume":"19","author":"G. Kleindorfer","year":"1971","unstructured":"Kleindorfer, G. 1971. Bounding distributions for a stochastic acyclic network. Oper. Res 19:1586\u20131601.","journal-title":"Oper. Res"},{"key":"250897_CR16","doi-asserted-by":"crossref","unstructured":"Lee, W., and Kim, Y. 1995. MPEG-2 video decoding on programmable processors: computational and architectural requirements. Proc. SPIE pp. 265\u2013287.","DOI":"10.1117\/12.227954"},{"issue":"4","key":"250897_CR17","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1109\/30.555857","volume":"42","author":"N. Liu","year":"1996","unstructured":"Liu, N. 1996. MPEG decoder architecture for embedded applications. IEEE Trans. Consumer Elect. 42(4):1021\u20131028.","journal-title":"IEEE Trans. Consumer Elect."},{"key":"250897_CR18","unstructured":"Luenberger, D. G, 1989. Linear and Nonlinear Programming. Addison-Wesley."},{"key":"250897_CR19","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1287\/opre.7.5.646","volume":"7","author":"D. Malcolm","year":"1959","unstructured":"Malcolm, D., Roseboom, J., Clark, C., and Fazar, W. 1959. Applications of a technique for R & D program evaluation. Oper. Res 7:646\u2013669.","journal-title":"Oper. Res"},{"key":"250897_CR20","doi-asserted-by":"crossref","unstructured":"De Micheli, G., and Sami, M., editors. 1996. Hardware\/Software Codesign. Kluwer Academic.","DOI":"10.1007\/978-94-009-0187-2"},{"key":"250897_CR21","doi-asserted-by":"crossref","unstructured":"Mitra, D., and Morrison, J. A. 1995. Multiple time scale regulation and worst case processes for ATM network control. Proc. 34th CDC pp. 353\u2013357.","DOI":"10.1109\/CDC.1995.478814"},{"key":"250897_CR22","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/INFCOM.1996.493343","volume":"2","author":"M. Montgomery","year":"1996","unstructured":"Montgomery, M., and de Veciana, G. 1996. On the relevance of time scales in performance oriented traffic modeling. Proc. IEEE INFOCOM 2: 513\u2013520.","journal-title":"Proc. IEEE INFOCOM"},{"key":"250897_CR23","unstructured":"Peixoto, H., and Jacome, M. 1997. Algorithm and architecture level design space exploration using hierarchical data flows. Proc. 11th Intern. Conf. on Application-specific Systems, Architectures and Processors pp. 71\u201382."},{"key":"250897_CR24","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1002\/net.3230070407","volume":"7","author":"A. Shogan","year":"1977","unstructured":"Shogan, A. 1977. Bounding distributions for a stochastic PERT network. Network 7:359\u2013381.","journal-title":"Network"},{"key":"250897_CR25","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1287\/opre.11.5.839","volume":"2","author":"R. Van Slyke","year":"1963","unstructured":"Van Slyke, R. 1963. Monte carlo methods and the PERT problem. Oper. Res 2:839\u2013860.","journal-title":"Oper. Res"},{"key":"250897_CR26","doi-asserted-by":"crossref","unstructured":"Tongsima, S., Chantrapornchai, C., Passos, N., and Sha, E. Scheduling with confidence for probabilistic data flow graphs. Proc. IEEE Great Lakes Symposium on VLSI pp. 150\u2013155. 1997.","DOI":"10.1109\/GLSV.1997.580528"},{"key":"250897_CR27","first-page":"552","volume":"4","author":"J. Wilberg","year":"1996","unstructured":"Wilberg, J., Ploeger, P., Camposano, R., Langevin, M., and Vierhaus, T. 1996. Codesign of hardware, software, and algorithms\u2014a case study. Proc. IEEE Inter. Symp. Cir & Syst. 4: 552\u2013555.","journal-title":"Proc. IEEE Inter. Symp. Cir & Syst."},{"key":"250897_CR28","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/BFb0121082","volume":"25","author":"R. Wollmer","year":"1985","unstructured":"Wollmer, R. 1985. Critical path planning under uncertainty. Math. Prog. Study 25:164\u2013171.","journal-title":"Math. Prog. Study"},{"key":"250897_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, T., Hu, X., and Sha, E. 1998. A probabilistic performance metric for real-time system design. Proc. 7th International Workshop on Hardware\/Software Codesign, pp. 90\u201394.","DOI":"10.1145\/301177.301494"}],"container-title":["Design Automation for Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008991500612.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008991500612\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008991500612.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:37:52Z","timestamp":1752460672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008991500612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,2]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,2]]}},"alternative-id":["250897"],"URL":"https:\/\/doi.org\/10.1023\/a:1008991500612","relation":{},"ISSN":["0929-5585","1572-8080"],"issn-type":[{"type":"print","value":"0929-5585"},{"type":"electronic","value":"1572-8080"}],"subject":[],"published":{"date-parts":[[2000,2]]}}}