{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:51Z","timestamp":1750306791941,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,2]]},"abstract":"<jats:p>Timing analysis for hard real-time systems.<\/jats:p>","DOI":"10.1145\/2500886","type":"journal-article","created":{"date-parts":[[2014,1,28]],"date-time":"2014-01-28T13:49:22Z","timestamp":1390916962000},"page":"94-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Computation takes time, but how much?"],"prefix":"10.1145","volume":"57","author":[{"given":"Reinhard","family":"Wilhelm","sequence":"first","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Daniel","family":"Grund","sequence":"additional","affiliation":[{"name":"Thales Transportation Systems in Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1967677.1967697"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-012-9152-2"},{"key":"e_1_2_1_3_1","unstructured":"Axer P. et al. Building timing predictable embedded systems. Trans. Embedded Computing Systems (2012).  Axer P. et al. Building timing predictable embedded systems. Trans. Embedded Computing Systems (2012)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_2_1_5_1","first-page":"7","article-title":"On the predictability of discrete dynamical systems","volume":"130","author":"Bernardes J.N.C","year":"2001","journal-title":"Proc. of the American Math. Soc."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Cousot P. Abstract interpretation based formal methods and future challenges. Informatics---10 Years Back 10 Years Ahead (2001) 138--156.   Cousot P. Abstract interpretation based formal methods and future challenges. Informatics---10 Years Back 10 Years Ahead (2001) 138--156.","DOI":"10.1007\/3-540-44577-3_10"},{"volume-title":"Proceedings of Embedded Real Time Software and Systems (May","year":"2010","author":"Cullmann C.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646787.703893"},{"volume-title":"Proceedings of the 4th European Congress ERTS Embedded Real-Time Software","year":"2008","author":"Ferdinand C.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008186323068"},{"volume-title":"Saarland University","year":"2012","author":"Grund D.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.05.013"},{"volume-title":"Proceedings of the 10th International Workshop on Worst-Case Execution Time Analysis.","author":"Gustafsson J.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.12"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008189014032"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027799"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2008.0141"},{"volume-title":"Embedded World Congress","year":"2013","author":"K\u00e4stner D.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4271\/2011-01-0444"},{"volume-title":"Embedded World Congress","year":"2013","author":"K\u00e4stner D.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33675-1_10"},{"volume-title":"Proceedings of the 29th International System Safety Conference (Las Vegas","year":"2011","author":"K\u00e4stner D.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506426"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/217474.217570"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/827271.829103"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Martin F. Alt M. Wilhelm R. and Ferdinand C. Analysis of loops. Compiler Construction (1998) 80--94.   Martin F. Alt M. Wilhelm R. and Ferdinand C. Analysis of loops. Compiler Construction (1998) 80--94.","DOI":"10.1007\/BFb0026424"},{"volume-title":"Technical Report TI-10-00618","year":"2011","author":"National Highway Traffic Safety Administration Toyota unintended acceleration investigation.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008119029962"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435227.2435238"},{"volume-title":"Proceedings of 6th International Workshop on Worst-Case Execution Time Analysis (July","year":"2006","author":"Reineke J.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755888.1755899"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2011.28"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.29487"},{"key":"e_1_2_1_34_1","first-page":"393","article-title":"Industrial experience of abstract interpretation-based static analyzers. Building the Information Society. R. Jacquart, ed","volume":"156","author":"Souyris J","year":"2004","journal-title":"IFIP"},{"volume-title":"Proceedings of the 5th Intl. Workshop on Worst-Case Execution Time Analysis","year":"2005","author":"Souyris J.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01995673"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-008-0095-9"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/580571.828823"},{"key":"e_1_2_1_39_1","first-page":"349","article-title":"ILP-based interprocedural path analysis. Lecture Notes in Computer Science","volume":"2491","author":"Theiling H","year":"2002","journal-title":"EMSOFT"},{"volume-title":"Saarland University","year":"2004","author":"Thesing S.","key":"e_1_2_1_40_1"},{"volume-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks (June","year":"2003","author":"Thesing S.","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:TIME.0000045316.66276.6e"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2013287"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2500886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2500886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:27Z","timestamp":1750232067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2500886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["10.1145\/2500886"],"URL":"https:\/\/doi.org\/10.1145\/2500886","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2014,2]]},"assertion":[{"value":"2014-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}