2012
DOI: 10.1007/978-3-642-29709-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic Loop Bound Computation for WCET Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 15 publications
0
24
0
Order By: Relevance
“…Cost analysis A potential future application for our work is cost and resource analysis. Instances of this type of analyses are worst case execution time (WCET) analysis [Wilhelm et al 2008;Knoop et al 2011;Knoop et al 2012], as well as bound and amortised complexity analysis [Alias et al 2010;Albert et al 2012;Sinn et al 2014;Flores-Montoya and Hähnle 2014;Brockschmidt et al 2016]. A symbolic bound is calculated by expressing the complexity function as a system of recurrence relations; combinatorial techniques are then used to solve these relations.…”
Section: I S T X ;mentioning
confidence: 99%
See 1 more Smart Citation
“…Cost analysis A potential future application for our work is cost and resource analysis. Instances of this type of analyses are worst case execution time (WCET) analysis [Wilhelm et al 2008;Knoop et al 2011;Knoop et al 2012], as well as bound and amortised complexity analysis [Alias et al 2010;Albert et al 2012;Sinn et al 2014;Flores-Montoya and Hähnle 2014;Brockschmidt et al 2016]. A symbolic bound is calculated by expressing the complexity function as a system of recurrence relations; combinatorial techniques are then used to solve these relations.…”
Section: I S T X ;mentioning
confidence: 99%
“…A symbolic bound is calculated by expressing the complexity function as a system of recurrence relations; combinatorial techniques are then used to solve these relations. Automatic techniques for computing closed-form solutions of recurrence relations are based on rewriting rules [Métayer 1988;Rosendahl 1989] or solving difference equations using symbolic algebra manipulation systems [Wegbreit 1975;Knoop et al 2011;Knoop et al 2012]. The control flow refinement approach [Gulwani et al 2009;Chen et al 2013] instruments a program with counters and uses progress invariants to compute worst case or average case bounds.…”
Section: I S T X ;mentioning
confidence: 99%
“…These approaches usually employ model checking [15], pattern matching [16], symbolic execution [17,18], abstract interpretation [19], or other techniques to obtain precise loop bounds. For example, Maroneze [20] and Blazy et al [21] proposed a novel approach which has three steps: loop extraction, program slicing and bound calculation.…”
Section: Related Workmentioning
confidence: 99%
“…This includes, for instance, loop and infeasible paths analyses [7,8], cache analysis [9], and path enumeration techniques [10]. There exist several commercial tools, such as aiT 2 and Bound-T 3 , as well as academic implementations, such as SWEET 4 from Mälardalen University.…”
Section: Related Workmentioning
confidence: 99%
“…Although there exists a large body of work in the area of WCET analysis [7,8,9,10,11], surprisingly little has been done with interactive timing analsysis. Previous work addresses fast WCET analysis [12], interactive C code analysis [13], analysis of Java code [14] and timing analysis of Matlab/Simulink models [15].…”
Section: Introductionmentioning
confidence: 99%