Skip to main content
In this paper, we propose the use of constraint logic programming as a way of modeling contextsensitive execution-times of program segments. The context-sensitive constraints are collected automatically through static analysis or... more
    • by 
Knowledge about the Worst-Case Execution-Time (WCET) is of primordial importance in the validation of real-time systems. A WCET estimation must be safe and tight. Tightness in WCET estimation is highly desirable for an efficient... more
    • by 
    •   3  
      Worst-Case Execution Time AnalysisTime ComplexityProgramming Model
Worst Case Execution Time (WCET) computation is crucial to the overall timing analysis of real-time embedded systems. Facing the ever increasing complexity of such systems, techniques dedicated to WCET analysis can take advantage of... more
    • by 
    •   7  
      Software EngineeringEmbedded SystemsWorst-Case Execution Time AnalysisEstimation
Estimating the worst-case execution time (WCET) of real-time embedded systems is compulsory for the verification of their correct functioning. Traditionally, the WCET of a program is estimated assuming availability of the program's binary... more
    • by 
    •   15  
      Intellectual PropertySemanticsLinear ProgrammingEmbedded Systems
Abstract Estimating the worst-case execution time (WCET) of real-time programs is pivotal in their verification. WCET estimation either yields a numeric value that represents the maximum execution time of the program when executed on a... more
    • by 
I take real pleasure in seeing the proceedings of the 12th International Workshop on Worst-Case Execution Time Analysis online already on the day of the workshop. This helps WCET'12 achieve its goal of facilitating discussion and... more
    • by 
Corrosion occurs in many engineering structures such as bridges, pipelines, and refineries and leads to the destruction of materials in a gradual manner and thus shortening their lifespan. It is therefore crucial to assess the structural... more
    • by 
    • Corrosion
In this paper, we propose the use of constraint logic programming as a way of modeling contextsensitive execution-times of program segments. The context-sensitive constraints are collected automatically through static analysis or... more
    • by 
    • Worst Case Execution Time Analysis
In this paper, we propose the use of constraint logic programming as a way of modeling contextsensitive execution-times of program segments. The context-sensitive constraints are collected automatically through static analysis or... more
    • by 
    •   2  
      Computer ScienceWorst Case Execution Time Analysis
Obtaining tight worst-case execution-time (WCET) estimations of real-time tasks is crucial since overly-pessimistic estimations are deemed impractical. One way of making WCET estimations tighter is to incorporate more program-flow... more
    • by 
    •   12  
      Computer ScienceCorrelationHardwareReal Time Systems
Estimating the worst-case execution time (WCET) of real-time programs is pivotal in their verification. WCET estimation either yields a numeric value that represents the maximum execution time of the program when executed on a specific... more
    • by 
    •   2  
      Computer ScienceWorst Case Execution Time Analysis
I take real pleasure in seeing the proceedings of the 12th International Workshop on Worst-Case Execution Time Analysis online already on the day of the workshop. This helps WCET'12 achieve its goal of facilitating discussion and... more
    • by 
    • Computer Science
It is becoming increasingly difficult to ignore the complexity of software products. Software metrics are proposed to help show indications for quality, size, complexity, etc. of software products. In this paper, software metrics related... more
    • by 
    •   2  
      Software EngineeringSoftware Testing
In many online systems, shoppers are usually overwhelmed by a huge number of outcomes and choices. In practice however, they usually have interest in only some of these choices. While these online shopping systems allow the users to... more
    • by  and +1
    •   6  
      Customer SatisfactionKnowledge RepresentationConstraint Satisfaction ProblemsUser preferences
Data science augments manual data understanding with machine learning for potential performance increase. In this paper, data science methodology is examined to enhance machine learning application in smartphone based automatic human... more
    • by  and +2
    •   9  
      Sensors and SensingMachine LearningData Driven Learning (Applied Linguistics)Physical Activity
    • by 
    •   9  
      GeographyPhysical Medicine and RehabilitationGaitElderly People
    • by 
    •   19  
      EngineeringMechanical EngineeringNonlinear Time SeriesPhysical Medicine and Rehabilitation
Researchers in computer science and computer engineering devote a significant part of their efforts on communication and interaction between man and machine. Indeed, with the advent of multimedia and multimodal processing in real time,... more
    • by 
A pervasive computing system (PCS) requires that devices be context aware in order to provide proactively adapted services according to the current context. Because of the highly dynamic environment of a PCS, the service adaptation task... more
    • by  and +2
    • Pervasive and Ubiquitous Computing
The main characteristic of devices in a pervasive (or ubiquitous) computing system is their context awareness which allows them to provide proactively adapted services to user and to applications according to the global context. In order... more
    • by  and +1