{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:43:33Z","timestamp":1740120213920,"version":"3.37.3"},"reference-count":42,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","funder":[{"DOI":"10.13039\/501100001809","name":"the national natural science foundation of China","doi-asserted-by":"crossref","award":["No. 61173021","No. 61202092","No. 51277023"],"award-info":[{"award-number":["No. 61173021","No. 61202092","No. 51277023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2017,5]]},"abstract":"<jats:p>Worst case execution time (WCET) analysis is essential for exposing timeliness defects when developing hard real-time systems. However, it is too late to fix timeliness defects cheaply since developers generally perform WCET analysis in a final verification phase. To help developers quickly identify real timeliness defects in an early programming phase, a novel interactive WCET prediction with warning for timeout risk is proposed. The novelty is that the approach not only fast estimates WCET based on a control flow tree (CFT), but also assesses the estimated WCET with a trusted level by a lightweight false path analysis. According to the trusted levels, corresponding warnings will be triggered once the estimated WCET exceeds a preset safe threshold. Hence developers can identify real timeliness defects more timely and efficiently. To this end, we first analyze the reasons of the overestimation of CFT-based WCET calculation; then we propose a trusted level model of timeout risks; for recognizing the structural patterns of timeout risks, we develop a risk data counting algorithm; and we also give some tactics for applying our approach more effectively. Experimental results show that our approach has almost the same running speed compared with the fast and interactive WCET analysis, but it saves more time in identifying real timeliness defects.<\/jats:p>","DOI":"10.1142\/s0218001417500124","type":"journal-article","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T09:16:59Z","timestamp":1475227019000},"page":"1750012","source":"Crossref","is-referenced-by-count":5,"title":["Interactive WCET Prediction with Warning for Timeout Risk"],"prefix":"10.1142","volume":"31","author":[{"given":"Fanqi","family":"Meng","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, P. R. China"},{"name":"School of Information Engineering, Northeast Dianli University, Jilin 132012, P. R. China"}]},{"given":"Xiaohong","family":"Su","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, P. R. China"}]},{"given":"Zhaoyang","family":"Qu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Northeast Dianli University, Jilin 132012, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2017,2,27]]},"reference":[{"key":"S0218001417500124BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-015-0340-4"},{"key":"S0218001417500124BIB002","first-page":"1","author":"Altenbernd P.","year":"2016","journal-title":"Real-Time Syst."},{"key":"S0218001417500124BIB003","first-page":"1","author":"Altmeyer S.","year":"2016","journal-title":"Real-Time Syst."},{"key":"S0218001417500124BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2246172"},{"key":"S0218001417500124BIB005","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660200"},{"key":"S0218001417500124BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/2.846318"},{"key":"S0218001417500124BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.012"},{"key":"S0218001417500124BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2015.05.001"},{"key":"S0218001417500124BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2301752"},{"key":"S0218001417500124BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0824-9"},{"key":"S0218001417500124BIB013","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2930"},{"key":"S0218001417500124BIB014","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.01.038"},{"key":"S0218001417500124BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-014-9212-x"},{"key":"S0218001417500124BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2187457"},{"key":"S0218001417500124BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-012-0694-z"},{"key":"S0218001417500124BIB019","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1763"},{"key":"S0218001417500124BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-012-9155-z"},{"issue":"4","key":"S0218001417500124BIB021","first-page":"66","volume":"12","author":"Kafshdooz M. M.","year":"2016","journal-title":"ACM Trans. Architect. Code Optim."},{"key":"S0218001417500124BIB024","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768816010059"},{"key":"S0218001417500124BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.014"},{"issue":"1","key":"S0218001417500124BIB026","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13639-015-0020-8","volume":"2015","author":"Luckow K. S.","year":"2015","journal-title":"EURASIP J. Embedded Syst."},{"key":"S0218001417500124BIB028","doi-asserted-by":"publisher","DOI":"10.1145\/2559934"},{"key":"S0218001417500124BIB030","first-page":"1","author":"Meng F.","year":"2016","journal-title":"Cluster Comput."},{"key":"S0218001417500124BIB032","doi-asserted-by":"publisher","DOI":"10.1145\/2854151"},{"key":"S0218001417500124BIB033","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-016-0071-4"},{"key":"S0218001417500124BIB034","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1308-5"},{"key":"S0218001417500124BIB035","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1402-250"},{"key":"S0218001417500124BIB036","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-013-9198-9"},{"key":"S0218001417500124BIB037","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001416500087"},{"key":"S0218001417500124BIB038","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-015-9219-y"},{"key":"S0218001417500124BIB039","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.01.044"},{"issue":"7","key":"S0218001417500124BIB041","first-page":"639","volume":"41","author":"Rosner N.","year":"2015","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218001417500124BIB044","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2015.04.002"},{"key":"S0218001417500124BIB046","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0862-3"},{"key":"S0218001417500124BIB048","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.005"},{"issue":"5","key":"S0218001417500124BIB049","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/2345141.1967684","volume":"47","author":"Wan Q.","year":"2012","journal-title":"ACM SIGPLAN Not."},{"key":"S0218001417500124BIB050","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"S0218001417500124BIB051","doi-asserted-by":"publisher","DOI":"10.1145\/2500886"},{"key":"S0218001417500124BIB052","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt060"},{"issue":"5","key":"S0218001417500124BIB053","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2808704.2754967","volume":"50","author":"Zhang Z.","year":"2015","journal-title":"ACM SIGPLAN Not."},{"key":"S0218001417500124BIB054","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001416590060"},{"key":"S0218001417500124BIB055","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-015-9240-1"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001417500124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T09:59:29Z","timestamp":1601114369000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218001417500124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,27]]},"references-count":42,"journal-issue":{"issue":"05","published-online":{"date-parts":[[2017,2,27]]},"published-print":{"date-parts":[[2017,5]]}},"alternative-id":["10.1142\/S0218001417500124"],"URL":"https:\/\/doi.org\/10.1142\/s0218001417500124","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2017,2,27]]}}}