{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:20Z","timestamp":1750307540855,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,9,23]],"date-time":"2009-09-23T00:00:00Z","timestamp":1253664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,9,23]]},"DOI":"10.1145\/1620405.1620427","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:16:31Z","timestamp":1253906191000},"page":"150-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A predictable Java profile"],"prefix":"10.1145","author":[{"given":"Thomas","family":"B\u00f8gholm","sequence":"first","affiliation":[{"name":"Aalborg University, Denmark"}]},{"given":"Ren\u00e9 R.","family":"Hansen","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]},{"given":"Anders P.","family":"Ravn","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]},{"given":"Bent","family":"Thomsen","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]},{"given":"Hans","family":"S\u00f8ndergaard","sequence":"additional","affiliation":[{"name":"VIA University College, Horsens, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2009,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1119479.1119480"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620405.1620408"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","first-page":"60","volume-title":"Proceedings of FORMATS","author":"Amnell T.","year":"2003","unstructured":"T. Amnell , E. Fersman , L. Mokrushin , P. Pettersson , and W. Yi . TIMES: A tool for schedulability analysis and code generation of real-time systems . In K. G. Larsen and P. Niebert, editors, Proceedings of FORMATS 2003 , volume 2791 of Lecture Notes in Computer Science , pages 60 -- 72 . Springer-Verlag , 2004. T. Amnell, E. Fersman, L. Mokrushin, P. Pettersson, and W. Yi. TIMES: A tool for schedulability analysis and code generation of real-time systems. In K. G. Larsen and P. Niebert, editors, Proceedings of FORMATS 2003, volume 2791 of Lecture Notes in Computer Science, pages 60--72. Springer-Verlag, 2004."},{"key":"e_1_3_2_1_4_1","unstructured":"Aonix. Aonix research and development - safety critical java specification initiative. http:\/\/research.aonix.com\/jsc\/index.html 6 2009.  Aonix. Aonix research and development - safety critical java specification initiative. http:\/\/research.aonix.com\/jsc\/index.html 6 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02341919"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762174.1762189"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1434790.1434807"},{"key":"e_1_3_2_1_8_1","series-title":"Java Series","volume-title":"The Real-Time Specification for Java","author":"Bollella G.","year":"2000","unstructured":"G. Bollella , J. Gosling , B. Brosgol , P. Dibble , S. Furr , and M. Turnbull . The Real-Time Specification for Java . Java Series . Addison-Wesley , 2000 . G. Bollella, J. Gosling, B. Brosgol, P. Dibble, S. Furr, and M. Turnbull. The Real-Time Specification for Java. Java Series. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_9_1","volume-title":"Understanding Object-Oriented Programming with Java","author":"Budd T.","year":"1998","unstructured":"T. Budd . Understanding Object-Oriented Programming with Java . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1998 . T. Budd. Understanding Object-Oriented Programming with Java. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1998."},{"key":"e_1_3_2_1_10_1","volume-title":"Real-Time Systems and Programming Languages","author":"Burns A.","year":"2009","unstructured":"A. Burns and A. Wellings . Real-Time Systems and Programming Languages . Addison-Wesley , 4 edition, 2009 . A. Burns and A. Wellings. Real-Time Systems and Programming Languages. Addison-Wesley, 4 edition, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11526841_8"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/978-3-540-71322-7_2","volume-title":"Program Analysis and Compilation. Theory and Practice. Essays Dedicated to Reinhard Wilhelm on the Occasion of His 60th Birthday","author":"Ferdinand C.","year":"2007","unstructured":"C. Ferdinand , F. Martin , C. Cullmann , M. Schlickling , I. Stein , S. Thesing , and R. Heckmann . New developments in WCET analysis . In T. Reps, M. Sagiv, and J. Bauer, editors, Program Analysis and Compilation. Theory and Practice. Essays Dedicated to Reinhard Wilhelm on the Occasion of His 60th Birthday , volume 4444 of LNCS , pages 12 -- 52 . Springer Verlag , 2007 . C. Ferdinand, F. Martin, C. Cullmann, M. Schlickling, I. Stein, S. Thesing, and R. Heckmann. New developments in WCET analysis. In T. Reps, M. Sagiv, and J. Bauer, editors, Program Analysis and Compilation. Theory and Practice. Essays Dedicated to Reinhard Wilhelm on the Occasion of His 60th Birthday, volume 4444 of LNCS, pages 12--52. Springer Verlag, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349328"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30579-8_23"},{"key":"e_1_3_2_1_15_1","volume-title":"Third Real-Time Linux Workshop","author":"Gerum P.","year":"2001","unstructured":"P. Gerum . The xenomai project. implementing a rtos emulation framework on gnu\/linux . In Third Real-Time Linux Workshop , 2001 . P. Gerum. The xenomai project. implementing a rtos emulation framework on gnu\/linux. In Third Real-Time Linux Workshop, 2001."},{"key":"e_1_3_2_1_16_1","volume-title":"In Proc. of Conferencia Latinoamericana de Informatica (Latin American Computing Conference), CLEI'05","author":"Giambiagi P.","year":"2005","unstructured":"P. Giambiagi and G. Schneider . Memory consumption analysis of Java smart card . In In Proc. of Conferencia Latinoamericana de Informatica (Latin American Computing Conference), CLEI'05 , Santiago de Cali, Columbia , Oct. 2005 . P. Giambiagi and G. Schneider. Memory consumption analysis of Java smart card. In In Proc. of Conferencia Latinoamericana de Informatica (Latin American Computing Conference), CLEI'05, Santiago de Cali, Columbia, Oct. 2005."},{"key":"e_1_3_2_1_17_1","unstructured":"T. O. Group. Jsr 302: Safety critical java technology. http:\/\/jcp.org\/en\/jsr\/detail?id=302 2006.  T. O. Group. Jsr 302: Safety critical java technology. http:\/\/jcp.org\/en\/jsr\/detail?id=302 2006."},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/978-3-540-24725-8_22","volume-title":"Proc. of European Symposium on Programming, ESOP'04","author":"Hansen R. R.","year":"2004","unstructured":"R. R. Hansen . A Hardest Attacker for Leaking References . In D. Schmidt, editor, Proc. of European Symposium on Programming, ESOP'04 , volume 2986 of Lecture Notes in Computer Science , pages 310 -- 324 , Barcelona, Spain, Mar .\/ Apr. 2004 . Springer Verlag . R. R. Hansen. A Hardest Attacker for Leaking References. In D. Schmidt, editor, Proc. of European Symposium on Programming, ESOP'04, volume 2986 of Lecture Notes in Computer Science, pages 310--324, Barcelona, Spain, Mar.\/Apr. 2004. Springer Verlag."},{"key":"e_1_3_2_1_19_1","first-page":"174","volume-title":"Non-interference and Erasure Policies for JavaCard Bytecode. In Workshop on Issues in the Theory of Security, WITS'06","author":"Hansen R. R.","year":"2006","unstructured":"R. R. Hansen and C. W. Probst . Non-interference and Erasure Policies for JavaCard Bytecode. In Workshop on Issues in the Theory of Security, WITS'06 , pages 174 -- 189 , Vienna, Austria , Mar. 2006 . R. R. Hansen and C. W. Probst. Non-interference and Erasure Policies for JavaCard Bytecode. In Workshop on Issues in the Theory of Security, WITS'06, pages 174--189, Vienna, Austria, Mar. 2006."},{"key":"e_1_3_2_1_20_1","volume-title":"2nd International Workshop on the Certification of Safety-Critical Software Controlled Systems (SafeCert 2009)","author":"Henties T.","year":"2009","unstructured":"T. Henties , J. J. Hunt , D. Locke , K. Nilsen , M. Schoeberl , and J. Vitek . Java for safety-critical applications . 2nd International Workshop on the Certification of Safety-Critical Software Controlled Systems (SafeCert 2009) , Mar. 2009 . T. Henties, J. J. Hunt, D. Locke, K. Nilsen, M. Schoeberl, and J. Vitek. Java for safety-critical applications. 2nd International Workshop on the Certification of Safety-Critical Software Controlled Systems (SafeCert 2009), Mar. 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68863-1_9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.11.012"},{"key":"e_1_3_2_1_23_1","first-page":"4","year":"2009","unstructured":"Jam VM . Jam VM 1.5.3. http:\/\/jamvm.sourceforge.net\/ , 4 2009 . Jam VM. Jam VM 1.5.3. http:\/\/jamvm.sourceforge.net\/, 4 2009.","journal-title":"Jam VM 1.5.3. http:\/\/jamvm.sourceforge.net\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.68"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/583810.583825"},{"key":"e_1_3_2_1_26_1","volume-title":"The Java Virtual Machine Specification","author":"Lindholm T.","year":"1999","unstructured":"T. Lindholm and F. Yellin . The Java Virtual Machine Specification . Prentice Hall , 2 edition, 1999 . T. Lindholm and F. Yellin. The Java Virtual Machine Specification. Prentice Hall, 2 edition, 1999."},{"key":"e_1_3_2_1_27_1","first-page":"15","volume-title":"A profile for high-integrity real-time java programs","author":"Puschner P.","year":"2001","unstructured":"P. Puschner and A. Wellings . A profile for high-integrity real-time java programs . pages 15 -- 22 . IEEE Computer Society , 2001 . P. Puschner and A. Wellings. A profile for high-integrity real-time java programs. pages 15--22. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000016129.97430.c6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2007.9"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.63"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167999.1168008"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209972"},{"key":"e_1_3_2_1_34_1","unstructured":"Timesys. Rtsj reference implementation (ri) and technology compatibility kit (tck). http:\/\/www.timesys.com\/java\/ 2009.  Timesys. Rtsj reference implementation (ri) and technology compatibility kit (tck). http:\/\/www.timesys.com\/java\/ 2009."},{"key":"e_1_3_2_1_35_1","volume-title":"http:\/\/www.uppaal.com\/","author":"Uppaal AL.","year":"2009","unstructured":"UPPA AL. Uppaal . http:\/\/www.uppaal.com\/ , 2009 . UPPAAL. Uppaal. http:\/\/www.uppaal.com\/, 2009."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1434790.1434792"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420038163.ch14"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"volume-title":"Xenomai native skin API reference manual","year":"2006","key":"e_1_3_2_1_39_1","unstructured":"Xenomai. Xenomai native skin API reference manual , 2006 . Xenomai. Xenomai native skin API reference manual, 2006."}],"event":{"name":"JTRES '09: JTRES '09 -Proceedings of the 7th International Workshop on Java Technologies for Real-time and Embedded Systems","sponsor":["Universidad Complutense de Madrid","aicas GmbH","Sun Sun"],"location":"Madrid Spain","acronym":"JTRES '09"},"container-title":["Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1620405.1620427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1620405.1620427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:24Z","timestamp":1750249404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1620405.1620427"}},"subtitle":["rationale and implementations"],"short-title":[],"issued":{"date-parts":[[2009,9,23]]},"references-count":38,"alternative-id":["10.1145\/1620405.1620427","10.1145\/1620405"],"URL":"https:\/\/doi.org\/10.1145\/1620405.1620427","relation":{},"subject":[],"published":{"date-parts":[[2009,9,23]]},"assertion":[{"value":"2009-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}