{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:06Z","timestamp":1750220766762,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T00:00:00Z","timestamp":1592265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,16]]},"DOI":"10.1145\/3372799.3394371","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T15:04:12Z","timestamp":1590764652000},"page":"119-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Improving the Performance of WCET Analysis in the Presence of Variable Latencies"],"prefix":"10.1145","author":[{"given":"Zhenyu","family":"Bai","sequence":"first","affiliation":[{"name":"CNRS - IRIT - University of Toulouse, Toulouse, France"}]},{"given":"Hugues","family":"Cass\u00e9","sequence":"additional","affiliation":[{"name":"CNRS - IRIT - University of Toulouse, Toulouse, France"}]},{"given":"Marianne","family":"De Michiel","sequence":"additional","affiliation":[{"name":"CNRS - IRIT - University of Toulouse, Toulouse, France"}]},{"given":"Thomas","family":"Carle","sequence":"additional","affiliation":[{"name":"CNRS - IRIT - University of Toulouse, Toulouse, France"}]},{"given":"Christine","family":"Rochange","sequence":"additional","affiliation":[{"name":"CNRS - IRIT - University of Toulouse, Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2020,6,16]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"An introduction to binary decision diagrams. Lecturenotes","author":"Andersen H. R.","year":"1997","unstructured":"H. R. Andersen . An introduction to binary decision diagrams. Lecturenotes , IT University of Copenhagen , 1997 . H. R. Andersen. An introduction to binary decision diagrams. Lecturenotes, IT University of Copenhagen, 1997."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16256-5_6"},{"key":"e_1_3_2_2_3_1","volume-title":"Computation of WCET using programslicing and real-time model-checking. CoRR, abs\/1105.1633","author":"B\u00e9chennec J.-L.","year":"2011","unstructured":"J.-L. B\u00e9chennec and F. Cassez . Computation of WCET using programslicing and real-time model-checking. CoRR, abs\/1105.1633 , 2011 . J.-L. B\u00e9chennec and F. Cassez. Computation of WCET using programslicing and real-time model-checking. CoRR, abs\/1105.1633, 2011."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90017-A"},{"key":"e_1_3_2_2_5_1","volume-title":"Timed automata for modelling caches and pipelines. arXiv preprint arXiv:1511.04172","author":"Cassez F.","year":"2015","unstructured":"F. Cassez and P.G.A. Marug\u00e1n . Timed automata for modelling caches and pipelines. arXiv preprint arXiv:1511.04172 , 2015 . F. Cassez and P.G.A. Marug\u00e1n. Timed automata for modelling caches and pipelines. arXiv preprint arXiv:1511.04172, 2015."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.1999.811197"},{"key":"e_1_3_2_2_8_1","volume-title":"16th International Workshop on Worst-Case Execution Time Analysis","author":"Falk H.","year":"2016","unstructured":"H. Falk , S. Altmeyer , P. Hellinckx , B. Lisper , W. Puffitsch , C. Rochange , M. Schoeberl , R. B. Sorensen , P. W\u00e4gemann , and S. Wegener . Tacle bench: A benchmark collection to support worst-case execution time research . In 16th International Workshop on Worst-Case Execution Time Analysis , 2016 . H. Falk, S. Altmeyer, P. Hellinckx, B. Lisper, W. Puffitsch, C. Rochange,M. Schoeberl, R. B. Sorensen, P. W\u00e4gemann, and S. Wegener. Tacle bench: A benchmark collection to support worst-case execution time research. In 16th International Workshop on Worst-Case Execution Time Analysis, 2016."},{"issue":"1","key":"e_1_3_2_2_9_1","first-page":"53","volume":"48","author":"Healy C. A.","year":"1999","unstructured":"C. A. Healy , R. D. Arnold , F. Mueller , D. B. Whalley , and M. G. Har-mon . Bounding Pipeline and Instruction Cache Performance. IEEE Transactions on Computers , 48 ( 1 ): 53 -- 70 , January 1999 . C. A. Healy, R. D. Arnold, F. Mueller, D. B. Whalley, and M. G. Har-mon. Bounding Pipeline and Instruction Cache Performance. IEEE Transactions on Computers, 48(1):53--70, January 1999.","journal-title":"Bounding Pipeline and Instruction Cache Performance. IEEE Transactions on Computers"},{"key":"e_1_3_2_2_10_1","first-page":"1","volume-title":"10th European Signal Processing Conference","author":"Holsti N.","year":"2000","unstructured":"N. Holsti , T. L\u00e5ngbacka , and S. Saarinen . Worst-case execution time analysis for digital signal processors . In 10th European Signal Processing Conference , pages 1 -- 4 , 2000 . N. Holsti, T. L\u00e5ngbacka, and S. Saarinen. Worst-case execution time analysis for digital signal processors. In 10th European Signal Processing Conference, pages 1--4, 2000."},{"key":"e_1_3_2_2_11_1","volume-title":"Status of the Bound-T WCET tool","author":"Holsti N.","year":"2002","unstructured":"N. Holsti and S. Saarinen . Status of the Bound-T WCET tool . Space Systems Finland Ltd , 2002 . N. Holsti and S. Saarinen. Status of the Bound-T WCET tool. Space Systems Finland Ltd, 2002."},{"key":"e_1_3_2_2_12_1","first-page":"657","volume-title":"International Multi conference on Computer Science and Information Technology","author":"Kassem R.","year":"2008","unstructured":"R. Kassem , M. Briday , J.-L. B\u00e9chennec , Y. Trinquet , and G. Savaton . Simulator generation using an automaton based pipeline model fortiming analysis . In International Multi conference on Computer Science and Information Technology , pages 657 -- 664 . IEEE, 2008 . R. Kassem, M. Briday, J.-L. B\u00e9chennec, Y. Trinquet, and G. Savaton. Simulator generation using an automaton based pipeline model fortiming analysis. In International Multi conference on Computer Science and Information Technology, pages 657--664. IEEE, 2008."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34032-1_17"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45789-5_22"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-006-9205-5"},{"key":"e_1_3_2_2_16_1","first-page":"11","article-title":"Performance analysis of embedded software using implicit path enumeration","volume":"30","author":"Steven Li Y.-T.","year":"1995","unstructured":"Y.-T. Steven Li and S. Malik . Performance analysis of embedded software using implicit path enumeration . In ACM SIGPLAN Notices , volume 30 . 11 , pages 88--98, 1995 . Y.-T. Steven Li and S. Malik. Performance analysis of embedded software using implicit path enumeration. In ACM SIGPLAN Notices, volume 30.11, pages 88--98, 1995.","journal-title":"ACM SIGPLAN Notices"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1999.818824"},{"key":"e_1_3_2_2_18_1","first-page":"515","volume-title":"Mathematical Foundations of Computer Science","author":"Meinel C.","year":"1994","unstructured":"C. Meinel and A. Slobodov\u00e1 . On the complexity of constructing optimal ordered binary decision diagrams . In Mathematical Foundations of Computer Science 1994 , pages 515 -- 524 . Springer , 1994. C. Meinel and A. Slobodov\u00e1. On the complexity of constructing optimal ordered binary decision diagrams. In Mathematical Foundations of Computer Science 1994, pages 515--524. Springer, 1994."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/123186.123225"},{"key":"e_1_3_2_2_20_1","volume-title":"6th International Workshop on Worst-Case Execution Time Analysis(WCET'06)","author":"Reineke J.","year":"2006","unstructured":"J. Reineke , B. Wachter , S. Thesing , R. Wilhelm , I. Polian , J. Eisinger ,and B. Becker . A definition and classification of timing anomalies . In 6th International Workshop on Worst-Case Execution Time Analysis(WCET'06) , 2006 . J. Reineke, B. Wachter, S. Thesing, R. Wilhelm, I. Polian, J. Eisinger,and B. Becker. A definition and classification of timing anomalies. In 6th International Workshop on Worst-Case Execution Time Analysis(WCET'06), 2006."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00904-4_12"},{"key":"e_1_3_2_2_22_1","volume-title":"ILP-based path analysis on abstract pipeline state graphs. Ph Dthesis","author":"Stein I. J.","year":"2010","unstructured":"I. J. Stein . ILP-based path analysis on abstract pipeline state graphs. Ph Dthesis , Saarland University , 2010 . I. J. Stein. ILP-based path analysis on abstract pipeline state graphs. Ph Dthesis, Saarland University, 2010."},{"key":"e_1_3_2_2_24_1","volume-title":"The worst-case execution-time problem-overview of methods and survey of tools. ACM Transactions on Embedded Computing Systems (TECS), 7(3):1--53","author":"Wilhelm R.","year":"2008","unstructured":"R. Wilhelm , J. Engblom , A. Ermedahl , N. Holsti , S. Thesing , D. Whalley , G. Bernat , C. Ferdinand , R. Heckmann , T. Mitra , The worst-case execution-time problem-overview of methods and survey of tools. ACM Transactions on Embedded Computing Systems (TECS), 7(3):1--53 , 2008 . R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. Whalley,G. Bernat, C. Ferdinand, R. Heckmann, T. Mitra, et al. The worst-case execution-time problem-overview of methods and survey of tools. ACM Transactions on Embedded Computing Systems (TECS), 7(3):1--53, 2008."},{"key":"e_1_3_2_2_25_1","volume-title":"Wilhelm. Efficient Analysis of Pipeline Models for WCET Computa-tion. In WCET'05","author":"S","year":"2007","unstructured":"S Wilhelm. Efficient Analysis of Pipeline Models for WCET Computa-tion. In WCET'05 , 2007 . S Wilhelm. Efficient Analysis of Pipeline Models for WCET Computa-tion. In WCET'05, 2007."}],"event":{"name":"LCTES '20: 21st ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"London United Kingdom","acronym":"LCTES '20"},"container-title":["The 21st ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372799.3394371","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372799.3394371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:09Z","timestamp":1750200069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372799.3394371"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,16]]},"references-count":23,"alternative-id":["10.1145\/3372799.3394371","10.1145\/3372799"],"URL":"https:\/\/doi.org\/10.1145\/3372799.3394371","relation":{},"subject":[],"published":{"date-parts":[[2020,6,16]]},"assertion":[{"value":"2020-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}