We propose an approach for timing analysis of software-based embedded computer systems that builds on the established probabilistic framework of Bayesian networks. We envision an approach where we take (1) an abstract description of the control flow within a piece of software, and (2) a set of run-time traces, which are combined into a Bayesian network that can be seen as an interactive timing profile. The obtained profile can be used by the embedded systems engineer not only to obtain a probabilistic estimate of the WCET, but also to run interactive timing simulations, or to automatically identify software configurations that are likely to evoke noteworthy timing behavior, like, e.g., high variances of execution times, and which are theref...
Analyzing the impact of software execution on the reliability of a complex digital system is an incr...
Software simulation of embedded systems is generally less expensive and offers more flexibility than...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
We propose an approach for timing analysis of software-based embedded computer systems that builds o...
International audienceStatic timing analysis is the state-of-the-art practice of ascertaining the ti...
Static Timing Analysis is the state-of-the-art practice to ascertain the timing behaviour of current...
The unabated increase in the complexity of the hardware and software components of modern embedded r...
This survey covers probabilistic timing analysis techniques for real-time systems. It reviews and cr...
Many industrial real-time embedded systems are very large, flexible and highly configurable software...
Nowadays, the scientific community is looking for ways to understand the effect of software executio...
The use of increasingly complex hardware and software platforms in response to the ever rising perfo...
Static Timing Analysis is the state-of-the-art practice to ascertain the timing behaviour of current...
Cars, trains, trucks, telecom networks and industrial robots are examples of products relying on com...
The pressing market demand for competitive performance/cost ratios compels Critical Real-Time Embedd...
Measurement-Based Probabilistic Timing Analysis (MBPTA) has been shown to be an industrially viable ...
Analyzing the impact of software execution on the reliability of a complex digital system is an incr...
Software simulation of embedded systems is generally less expensive and offers more flexibility than...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
We propose an approach for timing analysis of software-based embedded computer systems that builds o...
International audienceStatic timing analysis is the state-of-the-art practice of ascertaining the ti...
Static Timing Analysis is the state-of-the-art practice to ascertain the timing behaviour of current...
The unabated increase in the complexity of the hardware and software components of modern embedded r...
This survey covers probabilistic timing analysis techniques for real-time systems. It reviews and cr...
Many industrial real-time embedded systems are very large, flexible and highly configurable software...
Nowadays, the scientific community is looking for ways to understand the effect of software executio...
The use of increasingly complex hardware and software platforms in response to the ever rising perfo...
Static Timing Analysis is the state-of-the-art practice to ascertain the timing behaviour of current...
Cars, trains, trucks, telecom networks and industrial robots are examples of products relying on com...
The pressing market demand for competitive performance/cost ratios compels Critical Real-Time Embedd...
Measurement-Based Probabilistic Timing Analysis (MBPTA) has been shown to be an industrially viable ...
Analyzing the impact of software execution on the reliability of a complex digital system is an incr...
Software simulation of embedded systems is generally less expensive and offers more flexibility than...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...