{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:04:44Z","timestamp":1730214284264,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/date.2011.5763043","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T22:45:16Z","timestamp":1361313916000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Pruning infeasible paths for tight WCRT analysis of synchronous programs"],"prefix":"10.1109","author":[{"given":"S","family":"Andalam","sequence":"first","affiliation":[]},{"given":"P S","family":"Roop","sequence":"additional","affiliation":[]},{"given":"A","family":"Girault","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630132"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1450135.1450175"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837288"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28644-8_25"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2003.1253272"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090639"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27813-9_26"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1629395.1629424"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1146909.1147002"},{"key":"ref19","first-page":"1","volume":"7","author":"wilhelm","year":"2008","journal-title":"The Worst-case Execution-time Problem-overview of Methods and Survey of Tools Trans on Embedded Computing Sys"},{"key":"ref4","first-page":"87","volume":"19","author":"berry","year":"1992","journal-title":"The Esterel synchronous programming language design semantics and implementation Science of Computer Programming"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805826"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.05.011"},{"journal-title":"a tool for verifying realtime properties of embedded systems In IEEE Conference on Decision and Control 2001","year":"0","author":"bertin","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/1687-3963-2007-052651"},{"key":"ref7","first-page":"401","volume":"21","author":"boussinot","year":"1991","journal-title":"Reactive C An extension of C to program reactive systems Software Practice and Experience"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MEMCOD.2010.5558636"},{"journal-title":"The Uppaal Tool","year":"0","key":"ref1"},{"key":"ref9","first-page":"23","article-title":"Comparison of implicit path enumeration and model checking based WCET Analysis","author":"huber","year":"0","journal-title":"Proc Int Workshop Worst-Case Execution Time Anal"},{"journal-title":"MicroBlaze Processor Reference Guide","year":"2008","key":"ref20"}],"event":{"name":"2011 Design, Automation & Test in Europe","start":{"date-parts":[[2011,3,14]]},"location":"Grenoble","end":{"date-parts":[[2011,3,18]]}},"container-title":["2011 Design, Automation &amp; Test in Europe"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5754459\/5762992\/05763043.pdf?arnumber=5763043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:16:53Z","timestamp":1490087813000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5763043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/date.2011.5763043","relation":{},"subject":[],"published":{"date-parts":[[2011,3]]}}}