International audienceAs the performance requirements of today's real-time systems are on the rise, system engineers are increasingly forced to optimize and tune the execution time of real-time software. Apart from usual optimizations targeting the average-case performance of a program, the worst-case execution time bound (WCET) delivered by program analysis tools often has to be improved to meet all the deadlines and ensure a safe operation of the entire system.Modern computer architectures pose a significant challenge to this task due to their high complexity. Out-of-order execution, speculation, caches, buffers, and branch predictors highly depend on the execution history and are thus difficult to analyze precisely for WCET analysis tool...
International audience<p>The growing complexity of modern computer architectures increasingly compli...
(eng) Instruction cache performance is one of the bottle-necks of processor performance. In this pap...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
Abstract—For real-time systems we need time-predictable pro-cessors. This paper presents a method ca...
Abstract. Future embedded systems are expected to use chip-multiprocessors to provide the execution ...
The quest for time-predictable systems has led to the exploration of new hardware architectures that...
Abstract — Modern processors have a small on-chip local memory for instructions. Usually it is in th...
The use of caches poses a difficult tradeoff for architects of real-time systems. While caches provi...
Abstract—This paper compares two proposed alternatives to conventional instruction caches: a scratch...
In the embedded domain, the gap between memory and processor performance and the increase in applica...
Single-path code has some unique properties that make it interesting to explore different caching an...
In the embedded domain, the gap between memory and processor performance and the increase in applica...
We explore the use of compiler optimizations, which optimize the layout of instructions in memory. T...
The instruction cache is a popular target for optimizations of microprocessor-based systems because ...
Current processors are optimized for average case performance, often leading to a high worst-case ex...
International audience<p>The growing complexity of modern computer architectures increasingly compli...
(eng) Instruction cache performance is one of the bottle-necks of processor performance. In this pap...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
Abstract—For real-time systems we need time-predictable pro-cessors. This paper presents a method ca...
Abstract. Future embedded systems are expected to use chip-multiprocessors to provide the execution ...
The quest for time-predictable systems has led to the exploration of new hardware architectures that...
Abstract — Modern processors have a small on-chip local memory for instructions. Usually it is in th...
The use of caches poses a difficult tradeoff for architects of real-time systems. While caches provi...
Abstract—This paper compares two proposed alternatives to conventional instruction caches: a scratch...
In the embedded domain, the gap between memory and processor performance and the increase in applica...
Single-path code has some unique properties that make it interesting to explore different caching an...
In the embedded domain, the gap between memory and processor performance and the increase in applica...
We explore the use of compiler optimizations, which optimize the layout of instructions in memory. T...
The instruction cache is a popular target for optimizations of microprocessor-based systems because ...
Current processors are optimized for average case performance, often leading to a high worst-case ex...
International audience<p>The growing complexity of modern computer architectures increasingly compli...
(eng) Instruction cache performance is one of the bottle-necks of processor performance. In this pap...
Artificial Software Diversity is a well-established method to increase security of computer systems ...