International audienceThe application of formal methods in the development of safety-critical embedded software is recommended in order to provide strong guarantees about the absence of software errors. In this context, WCET estimation tools constitute an important element to be formally verified. We present a formally verified WCET estimation tool, integrated to the formally verified CompCert C compiler. Our tool comes with a machine-checked proof which ensures that its WCET estimates are safe. Our tool operates over C programs and is composed of two main parts, a loop bound estimation and an Implicit Path Enumeration Technique (IPET)-based WCET calculation method. We evaluated the precision of the WCET estimates on a reference benchmark a...
Precise operation of real-time systems depends on functionally correct computations that are deliver...
International audienceMixed-criticality systems integrate components of different criticality. Diffe...
International audienceCritical embedded systems are generally composed of repetitive tasks that must...
International audienceThe application of formal methods in the development of safety-critical embedd...
Safety-critical systems - such as electronic flight control systems and nuclear reactor controls - m...
International audienceWorst-case execution time (WCET) estimation tools are complex pieces of softwa...
Abstract. Worst-case execution time (WCET) estimation tools are complex pieces of software performin...
Static Worst-Case Execution Time (WCET) ana-lysis is a technique to derive upper bounds for the ex-e...
International audienceCritical embedded systems are generally composed of repetitive tasks that must...
Standard static WCET analysis methods today are based on the IPET technique, where WCET estimation i...
WCET analyzers commonly rely on user-provided annotations such as loop bounds, recursion depths, reg...
International audienceIn this paper, we propose a static worst- case execution time (WCET) analysis ...
This paper explores the issues to be addressed to provide safe worst-case execution time (WCET) esti...
In order to reduce overestimations of worst-case execution time (WCET), in this article, we firstly ...
Accurate estimation of the tick length of a synchronous program is essential for efficient and predi...
Precise operation of real-time systems depends on functionally correct computations that are deliver...
International audienceMixed-criticality systems integrate components of different criticality. Diffe...
International audienceCritical embedded systems are generally composed of repetitive tasks that must...
International audienceThe application of formal methods in the development of safety-critical embedd...
Safety-critical systems - such as electronic flight control systems and nuclear reactor controls - m...
International audienceWorst-case execution time (WCET) estimation tools are complex pieces of softwa...
Abstract. Worst-case execution time (WCET) estimation tools are complex pieces of software performin...
Static Worst-Case Execution Time (WCET) ana-lysis is a technique to derive upper bounds for the ex-e...
International audienceCritical embedded systems are generally composed of repetitive tasks that must...
Standard static WCET analysis methods today are based on the IPET technique, where WCET estimation i...
WCET analyzers commonly rely on user-provided annotations such as loop bounds, recursion depths, reg...
International audienceIn this paper, we propose a static worst- case execution time (WCET) analysis ...
This paper explores the issues to be addressed to provide safe worst-case execution time (WCET) esti...
In order to reduce overestimations of worst-case execution time (WCET), in this article, we firstly ...
Accurate estimation of the tick length of a synchronous program is essential for efficient and predi...
Precise operation of real-time systems depends on functionally correct computations that are deliver...
International audienceMixed-criticality systems integrate components of different criticality. Diffe...
International audienceCritical embedded systems are generally composed of repetitive tasks that must...