{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:36Z","timestamp":1750220016179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:00:00Z","timestamp":1686096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-19-CE25-0002"],"award-info":[{"award-number":["ANR-19-CE25-0002"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,7]]},"DOI":"10.1145\/3575757.3593655","type":"proceedings-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T10:07:46Z","timestamp":1684836466000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["WCET analysis with procedure arguments as parameters"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3212-2183","authenticated-orcid":false,"given":"Sandro","family":"Grebant","sequence":"first","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0265-859X","authenticated-orcid":false,"given":"Cl\u00e9ment","family":"Ballabriga","sequence":"additional","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1669-8971","authenticated-orcid":false,"given":"Julien","family":"Forget","sequence":"additional","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7544-5309","authenticated-orcid":false,"given":"Giuseppe","family":"Lipari","sequence":"additional","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, France"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2576","volume-title":"Semi-Clairvoyance in Mixed-Criticality Scheduling. In 2019 IEEE Real-Time Systems Symposium (RTSS). IEEE","author":"Agrawal Kunal","year":"2019","unstructured":"Kunal Agrawal , Sanjoy Baruah , and Alan Burns . 2019 . Semi-Clairvoyance in Mixed-Criticality Scheduling. In 2019 IEEE Real-Time Systems Symposium (RTSS). IEEE , Hong Kong, China, 458\u2013468. https:\/\/doi.org\/10.1109\/RTSS46320. 2019.00047 ISSN: 2576 - 3172 . 10.1109\/RTSS46320.2019.00047 Kunal Agrawal, Sanjoy Baruah, and Alan Burns. 2019. Semi-Clairvoyance in Mixed-Criticality Scheduling. In 2019 IEEE Real-Time Systems Symposium (RTSS). IEEE, Hong Kong, China, 458\u2013468. https:\/\/doi.org\/10.1109\/RTSS46320.2019.00047 ISSN: 2576-3172."},{"volume-title":"Static Analysis(Lecture Notes in Computer Science), Radhia Cousot and David\u00a0A","author":"Alt Martin","key":"e_1_3_2_1_2_1","unstructured":"Martin Alt , Christian Ferdinand , Florian Martin , and Reinhard Wilhelm . 1996. Cache behavior prediction by abstract interpretation . In Static Analysis(Lecture Notes in Computer Science), Radhia Cousot and David\u00a0A . Schmidt (Eds.). Springer , Berlin, Heidelberg , 52\u201366. https:\/\/doi.org\/10.1007\/3-540-61739-6_33 10.1007\/3-540-61739-6_33 Martin Alt, Christian Ferdinand, Florian Martin, and Reinhard Wilhelm. 1996. Cache behavior prediction by abstract interpretation. In Static Analysis(Lecture Notes in Computer Science), Radhia Cousot and David\u00a0A. Schmidt (Eds.). Springer, Berlin, Heidelberg, 52\u201366. https:\/\/doi.org\/10.1007\/3-540-61739-6_33"},{"key":"e_1_3_2_1_3_1","first-page":"5","article-title":"Precise and efficient parametric path analysis","volume":"46","author":"Althaus Ernst","year":"2011","unstructured":"Ernst Althaus , Sebastian Altmeyer , and Rouven Naujoks . 2011 . Precise and efficient parametric path analysis . SIGPLAN Not. 46 , 5 (April 2011), 141\u2013150. https:\/\/doi.org\/10.1145\/2016603.1967697 10.1145\/2016603.1967697 Ernst Althaus, Sebastian Altmeyer, and Rouven Naujoks. 2011. Precise and efficient parametric path analysis. SIGPLAN Not. 46, 5 (April 2011), 141\u2013150. https:\/\/doi.org\/10.1145\/2016603.1967697","journal-title":"SIGPLAN Not."},{"volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2011(Lecture Notes in Computer Science)","author":"Althaus Ernst","key":"e_1_3_2_1_4_1","unstructured":"Ernst Althaus , Sebastian Altmeyer , and Rouven Naujoks . 2011. Symbolic Worst Case Execution Times . In Theoretical Aspects of Computing \u2013 ICTAC 2011(Lecture Notes in Computer Science) , Antonio Cerone and Pekka Pihlajasaari (Eds.). Springer , Berlin, Heidelberg , 25\u201344. https:\/\/doi.org\/10.1007\/978-3-642-23283-1_5 10.1007\/978-3-642-23283-1_5 Ernst Althaus, Sebastian Altmeyer, and Rouven Naujoks. 2011. Symbolic Worst Case Execution Times. In Theoretical Aspects of Computing \u2013 ICTAC 2011(Lecture Notes in Computer Science), Antonio Cerone and Pekka Pihlajasaari (Eds.). Springer, Berlin, Heidelberg, 25\u201344. https:\/\/doi.org\/10.1007\/978-3-642-23283-1_5"},{"key":"e_1_3_2_1_5_1","first-page":"2325","volume-title":"Parametric Timing Analysis for Complex Architectures. In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE","author":"Altmeyer Sebastian","year":"2008","unstructured":"Sebastian Altmeyer , Christian H\u00fcmbert , Bj\u00f6rn Lisper , and Reinhard Wilhelm . 2008 . Parametric Timing Analysis for Complex Architectures. In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE , Kaohsiung, Taiwan, 367\u2013376. https:\/\/doi.org\/10.1109\/RTCSA. 2008.7 ISSN: 2325 - 1301 . 10.1109\/RTCSA.2008.7 Sebastian Altmeyer, Christian H\u00fcmbert, Bj\u00f6rn Lisper, and Reinhard Wilhelm. 2008. Parametric Timing Analysis for Complex Architectures. In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, Kaohsiung, Taiwan, 367\u2013376. https:\/\/doi.org\/10.1109\/RTCSA.2008.7 ISSN: 2325-1301."},{"key":"e_1_3_2_1_6_1","unstructured":"Arm. 2023. Procedure Call Standard for the Arm\u00ae Architecture. https:\/\/developer.arm.com\/Additional%20Resources\/ABI-Procedure%20Call%20Standard%20for%20the%20Arm%20Architecture  Arm. 2023. Procedure Call Standard for the Arm\u00ae Architecture. https:\/\/developer.arm.com\/Additional%20Resources\/ABI-Procedure%20Call%20Standard%20for%20the%20Arm%20Architecture"},{"key":"e_1_3_2_1_7_1","volume-title":"OTAWA: An Open Toolbox for Adaptive WCET Analysis. In Software Technologies for Embedded and Ubiquitous Systems(Lecture Notes in Computer Science), Sang\u00a0Lyul Min","author":"Ballabriga Cl\u00e9ment","year":"2010","unstructured":"Cl\u00e9ment Ballabriga , Hugues Cass\u00e9 , Christine Rochange , and Pascal Sainrat . 2010 . OTAWA: An Open Toolbox for Adaptive WCET Analysis. In Software Technologies for Embedded and Ubiquitous Systems(Lecture Notes in Computer Science), Sang\u00a0Lyul Min , Robert Pettit, Peter Puschner, and Theo Ungerer (Eds.). Springer , Berlin, Heidelberg , 35\u201346. https:\/\/doi.org\/10.1007\/978-3-642-16256-5_6 10.1007\/978-3-642-16256-5_6 Cl\u00e9ment Ballabriga, Hugues Cass\u00e9, Christine Rochange, and Pascal Sainrat. 2010. OTAWA: An Open Toolbox for Adaptive WCET Analysis. In Software Technologies for Embedded and Ubiquitous Systems(Lecture Notes in Computer Science), Sang\u00a0Lyul Min, Robert Pettit, Peter Puschner, and Theo Ungerer (Eds.). Springer, Berlin, Heidelberg, 35\u201346. https:\/\/doi.org\/10.1007\/978-3-642-16256-5_6"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Verification, Model Checking, and Abstract Interpretation(LNCS, Vol.\u00a011388)","author":"Ballabriga Cl\u00e9ment","year":"2019","unstructured":"Cl\u00e9ment Ballabriga , Julien Forget , Laure Gonnord , Giuseppe Lipari , and Jordy Ruiz . 2019 . Static Analysis Of Binary Code With Memory Indirections Using Polyhedra. In VMCAI\u201919 - International Conference on Verification, Model Checking, and Abstract Interpretation(LNCS, Vol.\u00a011388) . Springer, Cascais, Portugal, 114\u2013135. https:\/\/doi.org\/10.1007\/978-3-030-11245-5_6 10.1007\/978-3-030-11245-5_6 Cl\u00e9ment Ballabriga, Julien Forget, Laure Gonnord, Giuseppe Lipari, and Jordy Ruiz. 2019. Static Analysis Of Binary Code With Memory Indirections Using Polyhedra. In VMCAI\u201919 - International Conference on Verification, Model Checking, and Abstract Interpretation(LNCS, Vol.\u00a011388). Springer, Cascais, Portugal, 114\u2013135. https:\/\/doi.org\/10.1007\/978-3-030-11245-5_6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3147413","article-title":"Symbolic WCET Computation","volume":"17","author":"Ballabriga Cl\u00e9ment","year":"2017","unstructured":"Cl\u00e9ment Ballabriga , Julien Forget , and Giuseppe Lipari . 2017 . Symbolic WCET Computation . ACM Transactions on Embedded Computing Systems 17 , 2 (2017), 1 \u2013 26 . https:\/\/doi.org\/10.1145\/3147413 10.1145\/3147413 Cl\u00e9ment Ballabriga, Julien Forget, and Giuseppe Lipari. 2017. Symbolic WCET Computation. ACM Transactions on Embedded Computing Systems 17, 2 (2017), 1\u201326. https:\/\/doi.org\/10.1145\/3147413","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"e_1_3_2_1_10_1","volume-title":"Graceful Degradation in Semi-Clairvoyant Scheduling. In 33rd Euromicro Conference on Real-Time Systems (ECRTS 2021)(Leibniz International Proceedings in Informatics (LIPIcs), Vol.\u00a0196)","author":"Baruah Sanjoy","year":"2021","unstructured":"Sanjoy Baruah and Pontus Ekberg . 2021 . Graceful Degradation in Semi-Clairvoyant Scheduling. In 33rd Euromicro Conference on Real-Time Systems (ECRTS 2021)(Leibniz International Proceedings in Informatics (LIPIcs), Vol.\u00a0196) , Bj\u00f6rn\u00a0B. Brandenburg (Ed.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 9:1\u20139:21. https:\/\/doi.org\/10.4230\/LIPIcs.ECRTS. 2021.9 10.4230\/LIPIcs.ECRTS.2021.9 Sanjoy Baruah and Pontus Ekberg. 2021. Graceful Degradation in Semi-Clairvoyant Scheduling. In 33rd Euromicro Conference on Real-Time Systems (ECRTS 2021)(Leibniz International Proceedings in Informatics (LIPIcs), Vol.\u00a0196), Bj\u00f6rn\u00a0B. Brandenburg (Ed.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 9:1\u20139:21. https:\/\/doi.org\/10.4230\/LIPIcs.ECRTS.2021.9"},{"key":"e_1_3_2_1_11_1","volume-title":"Second International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2008","author":"Benhamamouch Bilel","year":"2008","unstructured":"Bilel Benhamamouch , Bruno Monsuez , and Franck V\u00e9drine . 2008 . Computing WCET using symbolic execution . In Second International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2008 ). ScienceOpen, Leeds, UK, 1\u201312. https:\/\/doi.org\/10.14236\/ewic\/VECOS 2008.12 Publisher: BCS Learning & Development. 10.14236\/ewic Bilel Benhamamouch, Bruno Monsuez, and Franck V\u00e9drine. 2008. Computing WCET using symbolic execution. In Second International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2008). ScienceOpen, Leeds, UK, 1\u201312. https:\/\/doi.org\/10.14236\/ewic\/VECOS2008.12 Publisher: BCS Learning & Development."},{"key":"e_1_3_2_1_12_1","volume-title":"The Auspicious Couple: Symbolic Execution and WCET Analysis. In 13th International Workshop on Worst-Case Execution Time Analysis(OpenAccess Series in Informatics (OASIcs), Vol.\u00a030)","author":"Biere Armin","year":"2013","unstructured":"Armin Biere , Jens Knoop , Laura Kov\u00e1cs , and Jakob Zwirchmayr . 2013 . The Auspicious Couple: Symbolic Execution and WCET Analysis. In 13th International Workshop on Worst-Case Execution Time Analysis(OpenAccess Series in Informatics (OASIcs), Vol.\u00a030) , Claire Maiza (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 53\u201363. https:\/\/doi.org\/10.4230\/OASIcs.WCET. 2013.53 10.4230\/OASIcs.WCET.2013.53 Armin Biere, Jens Knoop, Laura Kov\u00e1cs, and Jakob Zwirchmayr. 2013. The Auspicious Couple: Symbolic Execution and WCET Analysis. In 13th International Workshop on Worst-Case Execution Time Analysis(OpenAccess Series in Informatics (OASIcs), Vol.\u00a030), Claire Maiza (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 53\u201363. https:\/\/doi.org\/10.4230\/OASIcs.WCET.2013.53"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Sensitivity analysis for fixed-priority real-time systems","volume":"39","author":"Bini Enrico","year":"2008","unstructured":"Enrico Bini , Marco Di\u00a0Natale , and Giorgio Buttazzo . 2008 . Sensitivity analysis for fixed-priority real-time systems . Real-Time Syst 39 , 1 (Aug. 2008), 5\u201330. https:\/\/doi.org\/10.1007\/s11241-006-9010-1 10.1007\/s11241-006-9010-1 Enrico Bini, Marco Di\u00a0Natale, and Giorgio Buttazzo. 2008. Sensitivity analysis for fixed-priority real-time systems. Real-Time Syst 39, 1 (Aug. 2008), 5\u201330. https:\/\/doi.org\/10.1007\/s11241-006-9010-1","journal-title":"Real-Time Syst"},{"key":"e_1_3_2_1_14_1","volume-title":"2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE","author":"Blackham B.","year":"2014","unstructured":"B. Blackham , M. Liffiton , and G. Heiser . 2014. Trickle: Automated infeasible path detection using all minimal unsatisfiable subsets . In 2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE , Berlin, Germany, 169\u2013178. https:\/\/doi.org\/10.1109\/RTAS. 2014 .6926000 10.1109\/RTAS.2014.6926000 B. Blackham, M. Liffiton, and G. Heiser. 2014. Trickle: Automated infeasible path detection using all minimal unsatisfiable subsets. In 2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, Berlin, Germany, 169\u2013178. https:\/\/doi.org\/10.1109\/RTAS.2014.6926000"},{"key":"e_1_3_2_1_15_1","volume-title":"Schedulability Analysis for Adaptive Mixed Criticality Systems with Arbitrary Deadlines and Semi-Clairvoyance. In 2020 IEEE Real-Time Systems Symposium (RTSS). IEEE","author":"Burns Alan","year":"2020","unstructured":"Alan Burns and Robert\u00a0 I. Davis . 2020 . Schedulability Analysis for Adaptive Mixed Criticality Systems with Arbitrary Deadlines and Semi-Clairvoyance. In 2020 IEEE Real-Time Systems Symposium (RTSS). IEEE , Houston, TX, 12\u201324. https:\/\/doi.org\/10.1109\/RTSS49844. 2020.00013 10.1109\/RTSS49844.2020.00013 Alan Burns and Robert\u00a0I. Davis. 2020. Schedulability Analysis for Adaptive Mixed Criticality Systems with Arbitrary Deadlines and Semi-Clairvoyance. In 2020 IEEE Real-Time Systems Symposium (RTSS). IEEE, Houston, TX, 12\u201324. https:\/\/doi.org\/10.1109\/RTSS49844.2020.00013"},{"key":"e_1_3_2_1_16_1","first-page":"6","article-title":"An efficient algorithm for parametric WCET calculation","volume":"57","author":"Bygde Stefan","year":"2011","unstructured":"Stefan Bygde , Andreas Ermedahl , and Bj\u00f6rn Lisper . 2011 . An efficient algorithm for parametric WCET calculation . Journal of Systems Architecture 57 , 6 (June 2011), 614\u2013624. https:\/\/doi.org\/10.1016\/j.sysarc.2010.06.009 10.1016\/j.sysarc.2010.06.009 Stefan Bygde, Andreas Ermedahl, and Bj\u00f6rn Lisper. 2011. An efficient algorithm for parametric WCET calculation. Journal of Systems Architecture 57, 6 (June 2011), 614\u2013624. https:\/\/doi.org\/10.1016\/j.sysarc.2010.06.009","journal-title":"Journal of Systems Architecture"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings 21st IEEE Real-Time Systems Symposium. IEEE","author":"Caccamo M.","year":"2000","unstructured":"M. Caccamo , G. Buttazzo , and Lui Sha . 2000 . Capacity sharing for overrun control . In Proceedings 21st IEEE Real-Time Systems Symposium. IEEE , Orlando, FL, USA, 295\u2013304. https:\/\/doi.org\/10.1109\/REAL. 2000.896018 10.1109\/REAL.2000.896018 M. Caccamo, G. Buttazzo, and Lui Sha. 2000. Capacity sharing for overrun control. In Proceedings 21st IEEE Real-Time Systems Symposium. IEEE, Orlando, FL, USA, 295\u2013304. https:\/\/doi.org\/10.1109\/REAL.2000.896018"},{"key":"e_1_3_2_1_18_1","volume-title":"5th International Workshop on Worst-Case Execution Time Analysis (WCET\u201905)","author":"Chen Ting","year":"2007","unstructured":"Ting Chen , Tulika Mitra , Abhik Roychoudhury , and Vivy Suhendra . 2007 . Exploiting Branch Constraints without Exhaustive Path Enumeration . In 5th International Workshop on Worst-Case Execution Time Analysis (WCET\u201905) (OpenAccess Series in Informatics (OASIcs), Vol.\u00a01), Reinhard Wilhelm (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 46\u201349. https:\/\/doi.org\/10.4230\/OASIcs.WCET. 2005.816 10.4230\/OASIcs.WCET.2005.816 Ting Chen, Tulika Mitra, Abhik Roychoudhury, and Vivy Suhendra. 2007. Exploiting Branch Constraints without Exhaustive Path Enumeration. In 5th International Workshop on Worst-Case Execution Time Analysis (WCET\u201905)(OpenAccess Series in Informatics (OASIcs), Vol.\u00a01), Reinhard Wilhelm (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 46\u201349. https:\/\/doi.org\/10.4230\/OASIcs.WCET.2005.816"},{"volume-title":"2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT). Association for Computing Machinery","author":"Chu D.","key":"e_1_3_2_1_19_1","unstructured":"D. Chu and J. Jaffar . 2011. Symbolic simulation on complicated loops for WCET Path Analysis . In 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT). Association for Computing Machinery , New York, NY, USA, 319\u2013328. D. Chu and J. Jaffar. 2011. Symbolic simulation on complicated loops for WCET Path Analysis. In 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT). Association for Computing Machinery, New York, NY, USA, 319\u2013328."},{"key":"e_1_3_2_1_20_1","first-page":"7","article-title":"Generalizing parametric timing analysis","volume":"42","author":"Coffman Joel","year":"2007","unstructured":"Joel Coffman , Christopher Healy , Frank Mueller , and David Whalley . 2007 . Generalizing parametric timing analysis . SIGPLAN Not. 42 , 7 (June 2007), 152\u2013154. https:\/\/doi.org\/10.1145\/1273444.1254795 10.1145\/1273444.1254795 Joel Coffman, Christopher Healy, Frank Mueller, and David Whalley. 2007. Generalizing parametric timing analysis. SIGPLAN Not. 42, 7 (June 2007), 152\u2013154. https:\/\/doi.org\/10.1145\/1273444.1254795","journal-title":"SIGPLAN Not."},{"key":"e_1_3_2_1_21_1","unstructured":"Joel\u00a0S. Cohen. 2003. Computer alegebra and symbolic computation: mathematical methods. AK Peters Natick Mass.  Joel\u00a0S. Cohen. 2003. Computer alegebra and symbolic computation: mathematical methods. AK Peters Natick Mass."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings 14th Euromicro Conference on Real-Time Systems. Euromicro RTS 2002. IEEE","author":"Colin A.","year":"2002","unstructured":"A. Colin and G. Bernat . 2002. Scope-tree: a program representation for symbolic worst-case execution time analysis . In Proceedings 14th Euromicro Conference on Real-Time Systems. Euromicro RTS 2002. IEEE , Vienna, Austria, 50\u201359. https:\/\/doi.org\/10.1109\/EMRTS. 2002 .1019185 10.1109\/EMRTS.2002.1019185 A. Colin and G. Bernat. 2002. Scope-tree: a program representation for symbolic worst-case execution time analysis. In Proceedings 14th Euromicro Conference on Real-Time Systems. Euromicro RTS 2002. IEEE, Vienna, Austria, 50\u201359. https:\/\/doi.org\/10.1109\/EMRTS.2002.1019185"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"volume-title":"Evaluation of Novel Approaches to Software Engineering(Communications in Computer and Information Science), Leszek\u00a0A","author":"Ding Sun","key":"e_1_3_2_1_24_1","unstructured":"Sun Ding and Hee Beng\u00a0Kuan Tan . 2013. Detection of Infeasible Paths: Approaches and Challenges . In Evaluation of Novel Approaches to Software Engineering(Communications in Computer and Information Science), Leszek\u00a0A . Maciaszek and Joaquim Filipe (Eds.). Springer , Berlin, Heidelberg , 64\u201378. https:\/\/doi.org\/10.1007\/978-3-642-45422-6_5 10.1007\/978-3-642-45422-6_5 Sun Ding and Hee Beng\u00a0Kuan Tan. 2013. Detection of Infeasible Paths: Approaches and Challenges. In Evaluation of Novel Approaches to Software Engineering(Communications in Computer and Information Science), Leszek\u00a0A. Maciaszek and Joaquim Filipe (Eds.). Springer, Berlin, Heidelberg, 64\u201378. https:\/\/doi.org\/10.1007\/978-3-642-45422-6_5"},{"key":"e_1_3_2_1_25_1","volume-title":"16th International Workshop on Worst-Case Execution Time Analysis. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik","author":"Falk Heiko","year":"2016","unstructured":"Heiko Falk , Sebastian Altmeyer , Peter Hellinckx , Bj\u00f6rn Lisper , Wolfgang Puffitsch , Christine Rochange , Martin Schoeberl , Rasmus\u00a0Bo S\u00f8rensen , Peter W\u00e4gemann , and Simon Wegener . 2016 . TACLeBench: A Benchmark Collection to Support Worst-Case Execution Time Research . In 16th International Workshop on Worst-Case Execution Time Analysis. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik , Toulouse, France, 2:1\u20132:10. https:\/\/doi.org\/10.4230\/OASIcs.WCET. 2016.2 10.4230\/OASIcs.WCET.2016.2 Heiko Falk, Sebastian Altmeyer, Peter Hellinckx, Bj\u00f6rn Lisper, Wolfgang Puffitsch, Christine Rochange, Martin Schoeberl, Rasmus\u00a0Bo S\u00f8rensen, Peter W\u00e4gemann, and Simon Wegener. 2016. TACLeBench: A Benchmark Collection to Support Worst-Case Execution Time Research. In 16th International Workshop on Worst-Case Execution Time Analysis. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Toulouse, France, 2:1\u20132:10. https:\/\/doi.org\/10.4230\/OASIcs.WCET.2016.2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1051\/ro\/1988220302431"},{"volume-title":"Reconfigurable Embedded Control Systems: Applications for Flexibility and Agility. IGI Global","author":"George Laurent","key":"e_1_3_2_1_27_1","unstructured":"Laurent George and Pierre Courbin . 2011. Reconfiguration of Uniprocessor Sporadic Real-Time Systems: The Sensitivity Approach . In Reconfigurable Embedded Control Systems: Applications for Flexibility and Agility. IGI Global , Hershey, PA. https:\/\/doi.org\/10.4018\/978-1-60960-086-0.ch007 Publication Title : Reconfigurable Embedded Control Systems: Applications for Flexibility and Agility . 10.4018\/978-1-60960-086-0.ch007 Laurent George and Pierre Courbin. 2011. Reconfiguration of Uniprocessor Sporadic Real-Time Systems: The Sensitivity Approach. In Reconfigurable Embedded Control Systems: Applications for Flexibility and Agility. IGI Global, Hershey, PA. https:\/\/doi.org\/10.4018\/978-1-60960-086-0.ch007 Publication Title: Reconfigurable Embedded Control Systems: Applications for Flexibility and Agility."},{"key":"e_1_3_2_1_28_1","volume-title":"Algorithms for Infeasible Path Calculation. In 6th International Workshop on Worst-Case Execution Time Analysis (WCET\u201906)","author":"Gustaffson Jan","year":"2006","unstructured":"Jan Gustaffson , Andreas Ermedahl , and Bj\u00f6rn Lisper . 2006 . Algorithms for Infeasible Path Calculation. In 6th International Workshop on Worst-Case Execution Time Analysis (WCET\u201906) (OpenAccess Series in Informatics (OASIcs), Vol.\u00a04), Frank Mueller (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 1\u20136. https:\/\/doi.org\/10.4230\/OASIcs.WCET. 2006.667 10.4230\/OASIcs.WCET.2006.667 Jan Gustaffson, Andreas Ermedahl, and Bj\u00f6rn Lisper. 2006. Algorithms for Infeasible Path Calculation. In 6th International Workshop on Worst-Case Execution Time Analysis (WCET\u201906)(OpenAccess Series in Informatics (OASIcs), Vol.\u00a04), Frank Mueller (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 1\u20136. https:\/\/doi.org\/10.4230\/OASIcs.WCET.2006.667"},{"key":"e_1_3_2_1_29_1","volume-title":"Automatic Derivation of Loop Bounds and Infeasible Paths for WCET Analysis Using Abstract Execution. In 2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906)","author":"Gustafsson Jan","year":"2006","unstructured":"Jan Gustafsson , Andreas Ermedahl , Christer Sandberg , and Bjorn Lisper . 2006 . Automatic Derivation of Loop Bounds and Infeasible Paths for WCET Analysis Using Abstract Execution. In 2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906) . IEEE, Rio de Janeiro, Brazil, 57\u201366. https:\/\/doi.org\/10.1109\/RTSS. 2006.12 10.1109\/RTSS.2006.12 Jan Gustafsson, Andreas Ermedahl, Christer Sandberg, and Bjorn Lisper. 2006. Automatic Derivation of Loop Bounds and Infeasible Paths for WCET Analysis Using Abstract Execution. In 2006 27th IEEE International Real-Time Systems Symposium (RTSS\u201906). IEEE, Rio de Janeiro, Brazil, 57\u201366. https:\/\/doi.org\/10.1109\/RTSS.2006.12"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/TSE.2002.1027799","article-title":"Automatic detection and exploitation of branch constraints for timing analysis","volume":"28","author":"Healy C.A.","year":"2002","unstructured":"C.A. Healy and D.B. Whalley . 2002 . Automatic detection and exploitation of branch constraints for timing analysis . IEEE Transactions on Software Engineering 28 , 8 (Aug. 2002), 763\u2013781. https:\/\/doi.org\/10.1109\/TSE.2002.1027799 10.1109\/TSE.2002.1027799 C.A. Healy and D.B. Whalley. 2002. Automatic detection and exploitation of branch constraints for timing analysis. IEEE Transactions on Software Engineering 28, 8 (Aug. 2002), 763\u2013781. https:\/\/doi.org\/10.1109\/TSE.2002.1027799","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/216636.216666"},{"key":"e_1_3_2_1_32_1","first-page":"1068","volume-title":"Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000. IEEE","author":"Lipari G.","year":"2000","unstructured":"G. Lipari and S. Baruah . 2000. Greedy reclamation of unused bandwidth in constant-bandwidth servers . In Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000. IEEE , Stockholm, Sweden, 193\u2013200. https:\/\/doi.org\/10.1109\/EMRTS. 2000 .854007 ISSN: 1068 - 3070 . 10.1109\/EMRTS.2000.854007 G. Lipari and S. Baruah. 2000. Greedy reclamation of unused bandwidth in constant-bandwidth servers. In Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000. IEEE, Stockholm, Sweden, 193\u2013200. https:\/\/doi.org\/10.1109\/EMRTS.2000.854007 ISSN: 1068-3070."},{"key":"e_1_3_2_1_33_1","first-page":"5","article-title":"TIC: a scalable model checking based approach to WCET estimation","volume":"51","author":"Metta Ravindra","year":"2016","unstructured":"Ravindra Metta , Martin Becker , Prasad Bokil , Samarjit Chakraborty , and R Venkatesh . 2016 . TIC: a scalable model checking based approach to WCET estimation . ACM SIGPLAN Notices 51 , 5 (June 2016), 72\u201381. https:\/\/doi.org\/10.1145\/2980930.2907961 10.1145\/2980930.2907961 Ravindra Metta, Martin Becker, Prasad Bokil, Samarjit Chakraborty, and R Venkatesh. 2016. TIC: a scalable model checking based approach to WCET estimation. ACM SIGPLAN Notices 51, 5 (June 2016), 72\u201381. https:\/\/doi.org\/10.1145\/2980930.2907961","journal-title":"ACM SIGPLAN Notices"},{"key":"e_1_3_2_1_34_1","first-page":"1052","volume-title":"26th IEEE International Real-Time Systems Symposium (RTSS\u201905)","author":"Mohan S.","year":"2005","unstructured":"S. Mohan , F. Mueller , W. Hawkins , M. Root , C. Healy , and D. Whalley . 2005. ParaScale: exploiting parametric timing analysis for real-time schedulers and dynamic voltage scaling . In 26th IEEE International Real-Time Systems Symposium (RTSS\u201905) . IEEE, Miami, FL, USA, 10 pp.\u2013242. https:\/\/doi.org\/10.1109\/RTSS. 2005 .33 ISSN: 1052 - 8725 . 10.1109\/RTSS.2005.33 S. Mohan, F. Mueller, W. Hawkins, M. Root, C. Healy, and D. Whalley. 2005. ParaScale: exploiting parametric timing analysis for real-time schedulers and dynamic voltage scaling. In 26th IEEE International Real-Time Systems Symposium (RTSS\u201905). IEEE, Miami, FL, USA, 10 pp.\u2013242. https:\/\/doi.org\/10.1109\/RTSS.2005.33 ISSN: 1052-8725."},{"key":"e_1_3_2_1_35_1","first-page":"2","article-title":"Parametric timing analysis and its application to dynamic voltage scaling","volume":"10","author":"Mohan Sibin","year":"2011","unstructured":"Sibin Mohan , Frank Mueller , Michael Root , William Hawkins , Christopher Healy , David Whalley , and Emilio Vivancos . 2011 . Parametric timing analysis and its application to dynamic voltage scaling . ACM Trans. Embed. Comput. Syst. 10 , 2 (Jan. 2011), 25:1\u201325:34. https:\/\/doi.org\/10.1145\/1880050.1880061 10.1145\/1880050.1880061 Sibin Mohan, Frank Mueller, Michael Root, William Hawkins, Christopher Healy, David Whalley, and Emilio Vivancos. 2011. Parametric timing analysis and its application to dynamic voltage scaling. ACM Trans. Embed. Comput. Syst. 10, 2 (Jan. 2011), 25:1\u201325:34. https:\/\/doi.org\/10.1145\/1880050.1880061","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"e_1_3_2_1_36_1","first-page":"2325","volume-title":"2008 IEEE\/ACM\/IFIP Workshop on Embedded Systems for Real-Time Multimedia. IEEE","author":"Palopoli Luigi","year":"2008","unstructured":"Luigi Palopoli , Luca Abeni , Tommaso Cucinotta , Giuseppe Lipari , and Sanjoy\u00a0 K. Baruah . 2008 . Weighted feedback reclaiming for multimedia applications . In 2008 IEEE\/ACM\/IFIP Workshop on Embedded Systems for Real-Time Multimedia. IEEE , Atlanta, GA, USA, 121\u2013126. https:\/\/doi.org\/10.1109\/ESTMED. 2008.4697009 ISSN: 2325 - 1301 . 10.1109\/ESTMED.2008.4697009 Luigi Palopoli, Luca Abeni, Tommaso Cucinotta, Giuseppe Lipari, and Sanjoy\u00a0K. Baruah. 2008. Weighted feedback reclaiming for multimedia applications. In 2008 IEEE\/ACM\/IFIP Workshop on Embedded Systems for Real-Time Multimedia. IEEE, Atlanta, GA, USA, 121\u2013126. https:\/\/doi.org\/10.1109\/ESTMED.2008.4697009 ISSN: 2325-1301."},{"key":"e_1_3_2_1_37_1","first-page":"1545","volume-title":"2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE","author":"Reineke Jan","year":"2014","unstructured":"Jan Reineke and Johannes Doerfert . 2014 . Architecture-parametric timing analysis . In 2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE , Berlin, Germany, 189\u2013200. https:\/\/doi.org\/10.1109\/RTAS. 2014.6926002 ISSN: 1545 - 3421 . 10.1109\/RTAS.2014.6926002 Jan Reineke and Johannes Doerfert. 2014. Architecture-parametric timing analysis. In 2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, Berlin, Germany, 189\u2013200. https:\/\/doi.org\/10.1109\/RTAS.2014.6926002 ISSN: 1545-3421."},{"volume-title":"Transactions on High-Performance Embedded Architectures and Compilers II, Per Stenstr\u00f6m (Ed.). Vol.\u00a05470","author":"Rochange Christine","key":"e_1_3_2_1_38_1","unstructured":"Christine Rochange and Pascal Sainrat . 2009. A Context-Parameterized Model for Static Analysis of Execution Times . In Transactions on High-Performance Embedded Architectures and Compilers II, Per Stenstr\u00f6m (Ed.). Vol.\u00a05470 . Springer Berlin Heidelberg , Berlin, Heidelberg , 222\u2013241. https:\/\/doi.org\/10.1007\/978-3-642-00904-4_12 10.1007\/978-3-642-00904-4_12 Christine Rochange and Pascal Sainrat. 2009. A Context-Parameterized Model for Static Analysis of Execution Times. In Transactions on High-Performance Embedded Architectures and Compilers II, Per Stenstr\u00f6m (Ed.). Vol.\u00a05470. Springer Berlin Heidelberg, Berlin, Heidelberg, 222\u2013241. https:\/\/doi.org\/10.1007\/978-3-642-00904-4_12"},{"key":"e_1_3_2_1_39_1","volume-title":"Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs. In 15th International Workshop on Worst-Case Execution Time Analysis (WCET 2015)","author":"Ruiz Jordy","year":"2015","unstructured":"Jordy Ruiz and Hugues Cass\u00e9 . 2015 . Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs. In 15th International Workshop on Worst-Case Execution Time Analysis (WCET 2015) (OpenAccess Series in Informatics (OASIcs), Vol.\u00a047), Francisco\u00a0J. Cazorla (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 95\u2013104. https:\/\/doi.org\/10.4230\/OASIcs.WCET. 2015.95 10.4230\/OASIcs.WCET.2015.95 Jordy Ruiz and Hugues Cass\u00e9. 2015. Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs. In 15th International Workshop on Worst-Case Execution Time Analysis (WCET 2015)(OpenAccess Series in Informatics (OASIcs), Vol.\u00a047), Francisco\u00a0J. Cazorla (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 95\u2013104. https:\/\/doi.org\/10.4230\/OASIcs.WCET.2015.95"},{"key":"e_1_3_2_1_40_1","first-page":"2470","volume-title":"Working Around Loops for Infeasible Path Detection in Binary Programs. In 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE","author":"Ruiz Jordy","year":"2017","unstructured":"Jordy Ruiz , Hugues Cass\u00e9 , and Marianne de Michiel . 2017 . Working Around Loops for Infeasible Path Detection in Binary Programs. In 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE , Shanghai, China, 1\u201310. https:\/\/doi.org\/10.1109\/SCAM. 2017.13 ISSN: 2470 - 6892 . 10.1109\/SCAM.2017.13 Jordy Ruiz, Hugues Cass\u00e9, and Marianne de Michiel. 2017. Working Around Loops for Infeasible Path Detection in Binary Programs. In 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, Shanghai, China, 1\u201310. https:\/\/doi.org\/10.1109\/SCAM.2017.13 ISSN: 2470-6892."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 43rd annual Design Automation Conference(DAC \u201906)","author":"Suhendra Vivy","year":"2006","unstructured":"Vivy Suhendra , Tulika Mitra , Abhik Roychoudhury , and Ting Chen . 2006 . Efficient detection and exploitation of infeasible paths for software timing analysis . In Proceedings of the 43rd annual Design Automation Conference(DAC \u201906) . Association for Computing Machinery, New York, NY, USA, 358\u2013363. https:\/\/doi.org\/10.1145\/1146909.1147002 10.1145\/1146909.1147002 Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, and Ting Chen. 2006. Efficient detection and exploitation of infeasible paths for software timing analysis. In Proceedings of the 43rd annual Design Automation Conference(DAC \u201906). Association for Computing Machinery, New York, NY, USA, 358\u2013363. https:\/\/doi.org\/10.1145\/1146909.1147002"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/384198.384230"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629335.1629354"}],"event":{"name":"RTNS 2023: The 31st International Conference on Real-Time Networks and Systems","acronym":"RTNS 2023","location":"Dortmund Germany"},"container-title":["The 31st International Conference on Real-Time Networks and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575757.3593655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:21Z","timestamp":1750182681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575757.3593655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,7]]},"references-count":44,"alternative-id":["10.1145\/3575757.3593655","10.1145\/3575757"],"URL":"https:\/\/doi.org\/10.1145\/3575757.3593655","relation":{},"subject":[],"published":{"date-parts":[[2023,6,7]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}