Academia.eduAcademia.edu

Worst-Case Execution Time Analysis

description1,027 papers
group151 followers
lightbulbAbout this topic
Worst-Case Execution Time (WCET) Analysis is a method used in real-time systems to determine the maximum time a task or program segment may take to execute under the most unfavorable conditions. It is crucial for ensuring that time constraints are met in safety-critical applications.
lightbulbAbout this topic
Worst-Case Execution Time (WCET) Analysis is a method used in real-time systems to determine the maximum time a task or program segment may take to execute under the most unfavorable conditions. It is crucial for ensuring that time constraints are met in safety-critical applications.

Key research themes

1. How can execution trace and model-based analyses enhance understanding and prediction of worst-case execution time violations in real-time embedded systems?

Execution trace analysis and model-based timing validation approaches focus on capturing system behavior through runtime or simulated execution traces to diagnose and predict latency violations or WCET bounds in complex real-time embedded systems. These techniques address challenges in identifying root causes of timing anomalies and improve timing model correctness, critical for safety-critical CPS and real-time applications with stringent temporal requirements.

Key finding: The paper introduces PLAN, a technique that builds a dependency graph from allocation models involving hardware and software components, then analyzes execution traces to classify transactions for their impact on latency... Read more
Key finding: This work applies static analysis using abstract interpretation to predict WCET on complex pipelines and caches of the Motorola ColdFire 5307 processor. It offers a safe upper bound to WCET, significantly tighter than... Read more
Key finding: The paper demonstrates that worst-case instruction execution time does not always correspond to worst-case program execution time in dynamically scheduled processors, revealing timing anomalies where longer individual... Read more
Key finding: The paper presents a framework for jointly deriving and formally validating timing models of software and hardware in cyber-physical systems. It formalizes timing behaviors using TLA+ and Sail languages, links... Read more
Key finding: Proposes an assembly-level path feasibility detection method that incorporates partially-known variable analysis to prune infeasible paths during WCET calculation, reducing overestimation by eliminating dead paths not... Read more

2. How can power-aware cache analysis be integrated into worst-case execution time estimation to achieve energy-efficient real-time systems without compromising timing guarantees?

This cluster addresses the intersection of WCET analysis and energy efficiency by modeling cache utilization at the compiler and analysis levels to identify and shut-off non-useful cache portions. It seeks to optimize cache power consumption while maintaining strict timing constraints through static program analysis, leading to improved energy-aware WCET bounds applicable to embedded systems with limited power budgets.

by Wenlei Bao and 
1 more
Key finding: Introduces a power-aware WCET analysis framework (PWCET) that uses compiler-based analysis to calculate the useful cache sizes, enabling the identification of non-useful cache that can be turned off to save power without... Read more
Key finding: The paper presents a technique combining static source code analysis with dynamic runtime performance monitoring via hardware performance counters to approximate WCET in systems with preemptive multitasking and dynamic module... Read more

3. How can multi-threading and synchronization constructs be modeled to reduce overly pessimistic worst-case execution time estimates in real-time systems?

This theme examines the impact of multi-threading and critical section contention on WCET overestimations. By carefully modeling resource contention and the sequential execution proportions within loops, alternative WCET calculation models reduce pessimism, leading to tighter WCET bounds. Addressing multi-thread interference effects allows more accurate and efficient resource and energy management in real-time and embedded software analysis.

Key finding: Proposes a refined WCET calculation model accounting for the proportional execution times of computation versus critical sections in multi-threaded loops, alleviating the overestimation caused when worst-case blocking... Read more

All papers in Worst-Case Execution Time Analysis

where energy imposes a major constraint. We focus on frame-based real-time systems that execute variable workloads with the goal of minimizing expected energy consumption in the system while still meeting the deadlines. In our separate... more
We present an on-line investment algorithm which a c hieves almost the same wealth as the best constant-rebalanced portfolio determined in hindsight from the actual market outcomes. The algorithm employs a multiplicative update rule... more
Distributions for returns are used to compute the capital charge for portfolios in investment banks. The mainstream definition of returns is based on closing prices and neglects the important effects of intraday trading activity on the... more
IP address lookup at the router is a complex problem. This has been primarily due to the increasing table sizes, growth in traffic rate and high link capacities. In this work we have proposed an algorithm for fast routing lookup with... more
This paper presents new algorithms for the maximum flow problem, the Hitchcock t r a n s p o r t a t i o n problem, and the general minimum-cost flow problem. Upper bounds on the numbers of steps in these algorithms are derived, and are... more
The increasing gap between the speed of the processor and the memory makes the role played by the memory hierarchy essential in the system performance. There are several methods for studying this behavior. Trace-driven simulation has been... more
Estimating the worst-case execution time (WCET) of parallel applications running on many-core architectures is a significant challenge. Some approaches have been proposed, but they assume the mapping of parallel applications on cores... more
We propose a novel formal method to compute an upper estimation of the WCET that contains the loss of precision and also can be easily parametrized by the hardware architecture. Assuming that there exists an executable timed model of the... more
Abstract--In this paper we present a model able to serve in validating either functional or non-functional properties of the hard real time systems. We firstly introduce the timed SystemC waiting state automata (TWSA) that will serve in... more
Abstract-In present day sub-micron technology, reduction of circuit complexity of on-chip VLSI interconnects is an important issue for the analysis and verification of integrated circuits. In this paper, we present an exact method to... more
Multicore processors (CMPs) represent a good solution to provide the performance required by current and future hard real-time systems. However, it is difficult to compute a tight WCET estimation for CMPs due to interferences that tasks... more
An accurate and safe estimation of a task's worst case execution time (WCET) is crucial for reasoning about the timing properties of real-time systems. In RISC processors, the execution time of a program construct (e.g., a statement) is a... more
One of the key challenges in real-time systems is the analysis of the memory hierarchy. Many Worst-Case Execution Time (WCET) analysis methods supporting an instruction cache are based on iterative or convergence algorithms, which are... more
In multitasking real-time systems it is required to compute the WCET of each task and also the effects of interferences between tasks in the worst case. This is very complex with variable latency hardware, such as instruction cache... more
This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR ) based on two factors; Operation complexity (OC) and Communication Complexity (CC). OC can be defined as the number of steps... more
In this paper, we consider the online uniform machine scheduling problem on m processors when speed s i = 1 for i = k+1, ..., m and s i = s, s > 1, for i = 1, ..., k. The objective is to minimize makespan. We propose a parametric scheme... more
Most existing research on Mixed-Criticality (MC) scheduling (see [1] for a review) has focused on dealing with different WCET estimations of a single piece of code. This is typically a consequence of different tools for determining worst... more
An integrated guidance and control system for tracking a reference flight path trajectory of a reusable launch vehicle in the presence of model uncertainties, external disturbances, and measurement noises is proposed. To achieve this... more
Four authors wish to write a book, which will consist of fifteen chapters. Each chapter is to be written by a single author. The chapters differ in length, and the authors differ in expertise. The speed at which an author will be able to... more
The maximum flow algorithm is distinguished by the long line of successive contributions researchers have made in obtaining algorithms with incrementally better worst-case complexity. Some, but not all, of these theoretical improvements... more
Fixed-priority scheduling with deferred preemption (FPDS) has been proposed in the literature as a viable alternative to fixed-priority pre-emptive scheduling (FPPS), that obviates the need for non-trivial resource access protocols and... more
Let S n be the set of all permutations of {1, 2, . . . , n} represented in cycle notation. Define a n,m to be the number of π ∈ S n such that the length of the initial longest increasing sequence (ILIS) in π is at most m. For fixed m, we... more
Bank switching in embedded processors having partitioned memory architecture results in code size as well as run time overhead. An algorithm and its application to assist the compiler in eliminating the redundant bank switching codes... more
The compilation of Esterel into software has mainly targeted uniprocessor execution. The inherent parallelism of the original description would typically have to be compiled away in order for it to be executed sequentially on a processor.... more
This paper introduces a new analytical framework for analyzing and designing caches. It consists of four major parts: TSpec notation, into which reference traces can be transformed; equivalence classes, which abstract away chance effects... more
This paper introduces an analytical method for approximating the performability of a firm realtime system modeled by a multi-server queue. The service discipline in the queue is earliestdeadline-first (EDF), which is an optimal scheduling... more
The Stacker-Crane Problem (SCP) is a sequencing problem, arising in scheduling and transportation, that consists of finding the minimum cost cycle on a mixed graph with oriented arcs and unoriented edges: feasible solutions must traverse... more
Consider a homogeneous isotropic elastic-perfectly plastic body modeled by a bounded open subset of R 3 having a Lipschitz boundary = ∂. The body is assumed to be supported on an open subset 0 of its boundary and t denotes an external... more
Several groups are developing different versions of a new class of leadless, permanently implanted electronic devices with a size and form factor that allows them to be injected into muscles (BIONs TM). Their circuitry is protected from... more
There is a noticeable interest in merging standard database technology and real-time technology recently, resulted in combined systems known as Real-Time Database Systems. They are similar to the conventional databases, but they must... more
We present new algorithms for permutation group manipulation. Our methods result in an improvement of nearly an order of magnitude in the worst-case analysis for the fundamental problems of finding strong generating sets and testing... more
It is essential for social robots to be able to locate and direct attention towards communicating persons, however the operating environments can be challenging. When using sound source localization (SSL) acoustic noise sources can... more
This paper deals with day-ahead static security assessment with respect to a postulated set of contingencies while taking into account uncertainties about the next day system conditions. We propose a heuristic approach to check whether,... more
Common real-time analysis techniques for embedded systems mainly concentrate on a task model where every single activation of a task leads to a single outgoing event that is emitted at the end of the task's computation. An extension has... more
Common real-time analysis techniques for embedded systems mainly concentrate on a task model where every single activation of a task leads to a single outgoing event that is emitted at the end of the task's computation. An extension has... more
Recently, there has been substantial progress in the formal understanding of how caching resources should be allocated when multiple caches each deploy the common LRU policy. Nonetheless, the role played by caching policies beyond LRU in... more
Following the successful WCET Tool Challenges in 2006 and 2008, the third event in this series was organized in 2011, again with support from the ARTIST DESIGN Network of Excellence. Following the practice established in the previous... more
In this article, we present OTAWA, a framework for computing the Worst Case Execution Time of a program. From its design, it provides an extensible and open architecture whose objective is the implementation of existing and future static... more
These last years, many researchers have proposed solutions to estimate the Worst-Case Execution Time of a critical application when it is run on modern hardware. Several schemes commonly implemented to improve performance have been... more
Following the successful WCET Tool Challenges in 2006 and 2008, the third event in this series was organized in 2011, again with support from the ARTIST DESIGN Network of Excellence. Following the practice established in the previous... more
In real-time task scheduling on multiprocessor systems, partitioning approach has received the attention of many researchers because of its higher least upper bound utilization of safe systems. Semi-partitioning allows some tasks to be... more
To assure the consistency in a database, transactions have been used as a technique for a long time. Commonly transactions impart consistency at the overhead of appropriateness (abort or retry) and source (duplicate shared data and... more
The service provision problem described in this paper comes from an application of distributed processing in telecommunications networks. The objective is to max­ imize a service provider's profit from offering computational based... more
Failure of a safety-critical application on an embedded processor can lead to severe damage or even loss of life. Here we are concerned with two kinds of failure: stack overflow, which usually leads to run-time errors that are difficult... more
Synthesizing code from model-based software specifications using automatic code gener- ators such as the SCADE Suite allows design verifi- cation at early project stages and helps to avoid cod- ing errors, thus reducing the need for... more
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper... more
We introduce here a new method for extracting worst-cases of algorithms by using rewrite systems over automorphisms groups of inputs. We propose a canonical description of an algorithm, that is also related to the problem it solves. The... more
We introduce here a new method for extracting worst-cases of algorithms by using rewrite systems over automorphisms groups of inputs. We propose a canonical description of an algorithm, that is also related to the problem it solves. The... more
Download research papers for free!