{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T21:03:39Z","timestamp":1694639019090},"reference-count":12,"publisher":"Ubiquity Press, Ltd.","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data Sci. J."],"published-print":{"date-parts":[[2010]]},"DOI":"10.2481\/dsj.008-003","type":"journal-article","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T06:04:59Z","timestamp":1268373899000},"page":"13-28","source":"Crossref","is-referenced-by-count":0,"title":["Applying Statistical Design to Control the Risk of Over-Design with Stochastic Simulation"],"prefix":"10.5334","volume":"9","author":[{"given":"Yi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wanhua","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"3285","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/92.845896"},{"key":"2","unstructured":"Gustafsson, J. (2002) Worst case execution time analysis of object-oriented programs, Object-Oriented Real-Time Dependable Systems, 2002. (WORDS 2002). Proceedings of the Seventh International Workshop on 2002, 71-76, Digital Object Identifier 10.1109\/WORDS.2002.1000038"},{"key":"3","doi-asserted-by":"crossref","unstructured":"Hu, X., Zhou, T., & Sha, H.-M. (2001) Estimating probabilistic timing performance for real-time embedded systems. IEEE Trans. on VLSI systems, 9(6):833-844.","DOI":"10.1109\/92.974897"},{"key":"4","doi-asserted-by":"crossref","unstructured":"Hua, S., Qu, G., & Bhattacharyya, S. (2003) Energy reduction techniques for multimedia applications with tolerance to deadline misses. 40th ACM\/IEEE Design Automation Conference.","DOI":"10.1145\/775832.775868"},{"key":"5","doi-asserted-by":"crossref","unstructured":"Kalavade, A. & Moghe, P. (1998) A tool for performance estimation of networked embedded end-systems. Proc. Design Automation Conference, 257-262.","DOI":"10.1145\/277044.277116"},{"key":"6","doi-asserted-by":"crossref","unstructured":"Kligerman, E., &Stoyenko, A. (1986) Real-time euclid: A language for reliable real-time systems. IEEE Transactions on Software Engineering SE-12(9), 941-949.","DOI":"10.1109\/TSE.1986.6313049"},{"key":"7","unstructured":"Mok, A. K., Amerasinghe, P., Chen, M., &Tantisirivat, K. (1989) Evaluating tight execution time bounds of programs by annotations. Proc. 6th IEEE Workshop on Real-Time Operating Systems and Software, Pittsburgh, PA, USA, 74-80."},{"key":"8","doi-asserted-by":"crossref","unstructured":"Park, C.Y. & Shaw, A. (1990) Experiments with a Program Timing Tool Based on a Source-Level Timing Schema. In Proc. 11th IEEE Real-Time Systems Symposium(RTSS'90), 72-81.","DOI":"10.1109\/REAL.1990.128731"},{"key":"9","doi-asserted-by":"crossref","unstructured":"Puschner, P. (2000) Guest Editorial: A Review of Worst-Case Execution-Time Analysis[J]. Real-Time Systems Vol.18, No.2\/3.","DOI":"10.1023\/A:1008119029962"},{"key":"10","doi-asserted-by":"crossref","unstructured":"Puschner, P., & Koza, C. (1989) Calculating the maximum execution time of real-time programs. Real-Time Systems 1(2), 159-176.","DOI":"10.1007\/BF00571421"},{"key":"11","doi-asserted-by":"crossref","unstructured":"Shaw, A. C. (1989) Reasoning about time in higher-level language software. IEEE Transactions on Software Engineering SE-15(7), 875-889.","DOI":"10.1109\/32.29487"},{"key":"12","unstructured":"Taha, H. (2006) Operations Research: An Introduction (8th Edition), Prentice Hall."}],"container-title":["Data Science Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/doi.org\/10.2481\/dsj.008-003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T14:47:20Z","timestamp":1657550840000},"score":1,"resource":{"primary":{"URL":"http:\/\/datascience.codata.org\/articles\/abstract\/10.2481\/dsj.008-003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":12,"URL":"https:\/\/doi.org\/10.2481\/dsj.008-003","relation":{},"ISSN":["1683-1470"],"issn-type":[{"value":"1683-1470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}