(Created page with " == Abstract == Hard real-time systems have to satisfy strict timing constraints. To prove that these constraints are met, timing analyses aim to derive safe upper bounds on...") |
|||
(One intermediate revision by the same user not shown) | |||
Line 2: | Line 2: | ||
== Abstract == | == Abstract == | ||
− | Hard real-time systems have to satisfy strict timing constraints. To prove that these constraints are met, timing analyses aim to derive safe upper bounds on | + | Hard real-time systems have to satisfy strict timing constraints. To prove that these constraints are met, timing analyses aim to derive safe upper bounds on tasksâ execution times. Processor components such as caches, out-of-order pipelines, and speculation cause a large variation of the execution time of instructions, which may induce a large variability of a taskâs execution time. The architectural platform also determines the precision and the complexity of timing analysis. This paper provides an overview of our timing-analysis technique and in particular the methodological aspects of interest to the verification community. |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
Line 15: | Line 10: | ||
* [http://www.cs.ox.ac.uk/people/bjoern.wachter/papers/vmcai10-invited.pdf http://www.cs.ox.ac.uk/people/bjoern.wachter/papers/vmcai10-invited.pdf] | * [http://www.cs.ox.ac.uk/people/bjoern.wachter/papers/vmcai10-invited.pdf http://www.cs.ox.ac.uk/people/bjoern.wachter/papers/vmcai10-invited.pdf] | ||
+ | |||
+ | * [http://embedded.cs.uni-saarland.de/literature/vmcai10.pdf http://embedded.cs.uni-saarland.de/literature/vmcai10.pdf], | ||
+ | : [https://link.springer.com/chapter/10.1007/978-3-642-11319-2_3 https://link.springer.com/chapter/10.1007/978-3-642-11319-2_3], | ||
+ | : [https://dblp.uni-trier.de/db/conf/vmcai/vmcai2010.html#WilhelmABGHRWW10 https://dblp.uni-trier.de/db/conf/vmcai/vmcai2010.html#WilhelmABGHRWW10], | ||
+ | : [http://embedded.cs.uni-saarland.de/publications/vmcai10.pdf http://embedded.cs.uni-saarland.de/publications/vmcai10.pdf], | ||
+ | : [http://www.cs.ox.ac.uk/people/bjoern.wachter/papers/vmcai10-invited.pdf http://www.cs.ox.ac.uk/people/bjoern.wachter/papers/vmcai10-invited.pdf], | ||
+ | : [https://www.scipedia.com/public/Wilhelm_et_al_2010a https://www.scipedia.com/public/Wilhelm_et_al_2010a], | ||
+ | : [http://dx.doi.org/10.1007/978-3-642-11319-2_3 http://dx.doi.org/10.1007/978-3-642-11319-2_3], | ||
+ | : [https://dx.doi.org/10.1007/978-3-642-11319-2_3 https://dx.doi.org/10.1007/978-3-642-11319-2_3], | ||
+ | : [https://dl.acm.org/citation.cfm?id=2127757 https://dl.acm.org/citation.cfm?id=2127757], | ||
+ | : [https://rd.springer.com/chapter/10.1007/978-3-642-11319-2_3 https://rd.springer.com/chapter/10.1007/978-3-642-11319-2_3], | ||
+ | : [https://core.ac.uk/display/103655401 https://core.ac.uk/display/103655401], | ||
+ | : [https://academic.microsoft.com/#/detail/1549916137 https://academic.microsoft.com/#/detail/1549916137] | ||
+ | |||
+ | * [http://link.springer.com/content/pdf/10.1007/978-3-642-11319-2_3.pdf http://link.springer.com/content/pdf/10.1007/978-3-642-11319-2_3.pdf], | ||
+ | : [http://dx.doi.org/10.1007/978-3-642-11319-2_3 http://dx.doi.org/10.1007/978-3-642-11319-2_3] | ||
+ | |||
+ | * [https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/69878 https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/69878], | ||
+ | : [https://doi.org/10.1007/978-3-642-11319-2_3 https://doi.org/10.1007/978-3-642-11319-2_3] |
Hard real-time systems have to satisfy strict timing constraints. To prove that these constraints are met, timing analyses aim to derive safe upper bounds on tasksâ execution times. Processor components such as caches, out-of-order pipelines, and speculation cause a large variation of the execution time of instructions, which may induce a large variability of a taskâs execution time. The architectural platform also determines the precision and the complexity of timing analysis. This paper provides an overview of our timing-analysis technique and in particular the methodological aspects of interest to the verification community.
The different versions of the original document can be found in:
Published on 01/01/2010
Volume 2010, 2010
DOI: 10.1007/978-3-642-11319-2_3
Licence: CC BY-NC-SA license
Are you one of the authors of this document?