{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:24:35Z","timestamp":1747196675842,"version":"3.40.5"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/memcod.2014.6961864","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T20:57:36Z","timestamp":1417035456000},"page":"209-218","source":"Crossref","is-referenced-by-count":9,"title":["Building faithful high-level models and performance evaluation of manycore embedded systems"],"prefix":"10.1109","author":[{"given":"Ayoub","family":"Nouri","sequence":"first","affiliation":[]},{"given":"Marius","family":"Bozga","sequence":"additional","affiliation":[]},{"given":"Anca","family":"Molnos","sequence":"additional","affiliation":[]},{"given":"Axel","family":"Legay","sequence":"additional","affiliation":[]},{"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"R A language and environment for statistical computing R foundation for statistical computing","year":"2014","key":"19"},{"key":"35","first-page":"200","article-title":"A tutorial on uppaal","author":"behrmann","year":"2004","journal-title":"SFM"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/65.2.297"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1530873.1530882"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198501565.001.0001","author":"cowan","year":"1998","journal-title":"Statistical Data Analysis"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2000.858698"},{"journal-title":"Risk Analysis A Quantitative Guide","year":"2008","author":"vose","key":"15"},{"key":"34","first-page":"113","article-title":"METAMOC: Modular execution time analysis using model checking","author":"dalsgaard","year":"2010","journal-title":"WCET"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.2307\/2284333"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-012-0168-6"},{"journal-title":"Performance Evaluation of Computer and Communication Systems","year":"2010","author":"le boudec","key":"14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11164-3_28"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6127-9"},{"key":"12","first-page":"614","article-title":"DFinder: A tool for compositional deadlock detection and verification","author":"bensalem","year":"2009","journal-title":"CAV"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1017\/S096012951200028X"},{"journal-title":"Help to Fit of A Parametric Distribution to Non-censored or Censored Data","year":"2014","author":"delignette-muller","key":"20"},{"key":"22","first-page":"327","article-title":"Statistical model checking QoS properties of systems with SBIP","author":"bensalem","year":"2012","journal-title":"ISOLA"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-007-0085-2"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.16"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ASIC.2002.1158049"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/384198.384210"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAMOS.2009.5289246"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2001.915082"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1166\/jolpe.2009.1040"},{"journal-title":"Verification and planning for stochastic processes with asynchronous events","year":"2005","author":"younes","key":"3"},{"key":"2","first-page":"73","article-title":"Approximate Probabilistic Model Checking","author":"h\ufffdrault","year":"2004","journal-title":"VMCAI"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731118"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/43.898830"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2008.020299"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0118-0"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-014-0313-6"},{"key":"32","doi-asserted-by":"crossref","DOI":"10.1049\/ip-cdt:20045088","article-title":"System level performance analysis-the symta\/s approach","author":"henia","year":"2005","journal-title":"IEEE Proceedings Computers and Digital Techniques"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.27"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ACSD.2007.53"},{"key":"4","article-title":"Component assemblies in the context of manycore","author":"basu","year":"2011","journal-title":"FMCO"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228568"}],"event":{"name":"2014 Twelfth ACM\/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2014)","start":{"date-parts":[[2014,10,19]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2014,10,21]]}},"container-title":["2014 Twelfth ACM\/IEEE Conference on Formal Methods and Models for Codesign (MEMOCODE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6950639\/6961832\/06961864.pdf?arnumber=6961864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T21:20:22Z","timestamp":1747171222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6961864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/memcod.2014.6961864","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}