{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:25Z","timestamp":1750307065368,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T00:00:00Z","timestamp":1351036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Danish Research Council for Technology and Production Sciences","award":["10-083159"],"award-info":[{"award-number":["10-083159"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,24]]},"DOI":"10.1145\/2388936.2388945","type":"proceedings-article","created":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T18:44:56Z","timestamp":1351104296000},"page":"44-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Safety-critical Java for low-end embedded platforms"],"prefix":"10.1145","author":[{"given":"Hans","family":"S\u00f8ndergaard","sequence":"first","affiliation":[{"name":"VIA University College, Horsens, Denmark"}]},{"given":"Stephan E.","family":"Korsholm","sequence":"additional","affiliation":[{"name":"VIA University College, Horsens, Denmark"}]},{"given":"Anders P.","family":"Ravn","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2012,10,24]]},"reference":[{"volume-title":"http:\/\/www.aicas.com\/jamaica.html. Visited","year":"2012","key":"e_1_3_2_1_1_1","unstructured":"aicas. http:\/\/www.aicas.com\/jamaica.html. Visited June 2012 . aicas. http:\/\/www.aicas.com\/jamaica.html. Visited June 2012."},{"key":"e_1_3_2_1_2_1","volume-title":"Available at: http:\/\/commons.apache.org\/bcel\/manual.html","author":"Manual BCEL","year":"2012","unstructured":"Apache. BCEL Manual . Available at: http:\/\/commons.apache.org\/bcel\/manual.html , 2012 . Visited June 2012. Apache. BCEL Manual. Available at: http:\/\/commons.apache.org\/bcel\/manual.html, 2012. Visited June 2012."},{"key":"e_1_3_2_1_3_1","unstructured":"Atego. Aonix Perc Pico. Available at: http:\/\/www.atego.com\/products\/aonix-perc-pico\/.  Atego. Aonix Perc Pico. Available at: http:\/\/www.atego.com\/products\/aonix-perc-pico\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Visited","author":"Freaks AVR","year":"2012","unstructured":"AVRFeaks. AVR Freaks . http:\/\/www.avrfreaks.net\/ , Visited June 2012 . AVRFeaks. AVR Freaks. http:\/\/www.avrfreaks.net\/, Visited June 2012."},{"key":"e_1_3_2_1_5_1","volume-title":"Innovations in Systems and Software Engineering","author":"B\u00f8gholm T.","year":"2012","unstructured":"T. B\u00f8gholm , C. Frost , R. R. Hansen , C. S. Jensen , K. S. Luckow , A. P. Ravn , H. S\u00f8ndergaard , and B. Thomsen . Towards harnessing theories through tool support for hard real-time Java programming . Innovations in Systems and Software Engineering , June 2012 . T. B\u00f8gholm, C. Frost, R. R. Hansen, C. S. Jensen, K. S. Luckow, A. P. Ravn, H. S\u00f8ndergaard, and B. Thomsen. Towards harnessing theories through tool support for hard real-time Java programming. Innovations in Systems and Software Engineering, June 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620405.1620427"},{"key":"e_1_3_2_1_7_1","series-title":"Java Series","volume-title":"The Real-Time Specification for Java","author":"Bollella G.","year":"2000","unstructured":"G. Bollella , J. Gosling , B. Brosgol , P. Dibble , S. Furr , and M. Turnbull . The Real-Time Specification for Java . Java Series . Addison-Wesley , 2000 . G. Bollella, J. Gosling, B. Brosgol, P. Dibble, S. Furr, and M. Turnbull. The Real-Time Specification for Java. Java Series. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043910.2043931"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182811"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043910.2043927"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/portal.osek-vdx.org\/files\/pdf\/specs\/os223.pdf. Visited","author":"O. Group","year":"2012","unstructured":"O. Group . http:\/\/portal.osek-vdx.org\/files\/pdf\/specs\/os223.pdf. Visited May 2012 . O. Group. http:\/\/portal.osek-vdx.org\/files\/pdf\/specs\/os223.pdf. Visited May 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620405.1620412"},{"key":"e_1_3_2_1_14_1","volume-title":"Visited","author":"Korsholm S. E.","year":"2012","unstructured":"S. E. Korsholm . HVM (Hardware near Virtual Machine). http:\/\/www.icelab.dk\/ , Visited June 2012 . S. E. Korsholm. HVM (Hardware near Virtual Machine). http:\/\/www.icelab.dk\/, Visited June 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"Differentiating features of the PERC virtual machine. Available at: http:\/\/www.aonix.com\/pdf\/PERCWhitePaper_e.pdf","author":"Nilsen K.","year":"2009","unstructured":"K. Nilsen . Differentiating features of the PERC virtual machine. Available at: http:\/\/www.aonix.com\/pdf\/PERCWhitePaper_e.pdf , 2009 . K. Nilsen. Differentiating features of the PERC virtual machine. Available at: http:\/\/www.aonix.com\/pdf\/PERCWhitePaper_e.pdf, 2009."},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/www.nohau.se\/iar. Visited","author":"NOHAU.","year":"2012","unstructured":"NOHAU. http:\/\/www.nohau.se\/iar. Visited January 2012 . NOHAU. http:\/\/www.nohau.se\/iar. Visited January 2012."},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/icl.cs.utk.edu\/papi\/index.html","author":"Performance Application Programming Interface PI.","year":"2012","unstructured":"PA PI. Papi - the Performance Application Programming Interface . http:\/\/icl.cs.utk.edu\/papi\/index.html , 2012 . PAPI. Papi - the Performance Application Programming Interface. http:\/\/icl.cs.utk.edu\/papi\/index.html, 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620405.1620421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1850771.1850786"},{"volume-title":"http:\/\/www.polycom.dk\/. Visited","year":"2012","key":"e_1_3_2_1_20_1","unstructured":"Polycom. http:\/\/www.polycom.dk\/. Visited January 2012 . Polycom. http:\/\/www.polycom.dk\/. Visited January 2012."},{"key":"e_1_3_2_1_21_1","unstructured":"Polycom. The KIRK DECT application module 6.0. http:\/\/www.polycom.eu\/products\/voice\/wireless_solutions\/dect_communications\/modules\/dect_krm_application.html 2012.  Polycom. The KIRK DECT application module 6.0. http:\/\/www.polycom.eu\/products\/voice\/wireless_solutions\/dect_communications\/modules\/dect_krm_application.html 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043910.2043919"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043662.2043666"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.63"},{"key":"e_1_3_2_1_25_1","unstructured":"O. Shivers. http:\/\/www.ccs.neu.edu\/home\/shivers\/citations.html#diss. Visited August 2012.  O. Shivers. http:\/\/www.ccs.neu.edu\/home\/shivers\/citations.html#diss. Visited August 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288940.1288954"},{"key":"e_1_3_2_1_27_1","unstructured":"H. S\u00f8ndergaard and A. P. Ravn. Implementation of Predictable Java (PJ) and Safety Critical Java (SCJ). http:\/\/it-engineering.dk\/HSO\/PJ\/ Visited June 2012.  H. S\u00f8ndergaard and A. P. Ravn. Implementation of Predictable Java (PJ) and Safety Critical Java (SCJ). http:\/\/it-engineering.dk\/HSO\/PJ\/ Visited June 2012."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2011.23"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/354222.353189"},{"key":"e_1_3_2_1_30_1","unstructured":"TheOpenGroup. Jsr 302: Safety Critical Java Technology. http:\/\/jcp.org\/en\/jsr\/detail?id=302 2006.  TheOpenGroup. Jsr 302: Safety Critical Java Technology. http:\/\/jcp.org\/en\/jsr\/detail?id=302 2006."},{"key":"e_1_3_2_1_31_1","volume-title":"Safety-Critical Java Technology Specification. Draft Version 0.79","author":"TheOpenGroup","year":"2011","unstructured":"TheOpenGroup . Safety-Critical Java Technology Specification. Draft Version 0.79 , TheOpenGroup , May 2011 . TheOpenGroup. Safety-Critical Java Technology Specification. Draft Version 0.79, TheOpenGroup, May 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3968"}],"event":{"name":"JTRES '12: The 10th International Workshop on Java Technologies for Real-time and Embedded Systems","acronym":"JTRES '12","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2388936.2388945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2388936.2388945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:21Z","timestamp":1750238481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2388936.2388945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,24]]},"references-count":32,"alternative-id":["10.1145\/2388936.2388945","10.1145\/2388936"],"URL":"https:\/\/doi.org\/10.1145\/2388936.2388945","relation":{},"subject":[],"published":{"date-parts":[[2012,10,24]]},"assertion":[{"value":"2012-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}