The Transitive Reduction of a Directed Graph, SIAM Journal on Computing, vol.1, issue.2, pp.131-137, 1972. ,
DOI : 10.1137/0201008
The theory of parsing, translation, and compiling, 1972. ,
Multi-dimensional Rankings, Program Termination, and Complexity Bounds of Flowchart Programs, SAS, pp.117-133, 2010. ,
DOI : 10.1007/978-3-642-15769-1_8
URL : https://hal.archives-ouvertes.fr/inria-00523298
Certifying cost annotations in compilers, 1010. ,
URL : https://hal.archives-ouvertes.fr/hal-00524715
Yann Régis-Gianas, Claudio Sacerdoti Coen, and I. Stark. Certified complexity, Procedia CS, vol.7, pp.175-177, 2011. ,
OTAWA: An Open Toolbox for Adaptive WCET Analysis, SEUS, pp.35-46, 2010. ,
DOI : 10.1007/978-3-642-16256-5_6
URL : https://hal.archives-ouvertes.fr/hal-01055378
Certified Result Checking for Polyhedral Analysis of Bytecode Programs, Lecture Notes in Computer Science, vol.6084, pp.253-267, 2010. ,
DOI : 10.1007/978-3-642-15640-3_17
URL : https://hal.archives-ouvertes.fr/inria-00537816
The auspicious couple: Symbolic execution and WCET analysis, Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, pp.53-63, 2013. ,
Formal Verification of a C Compiler Front-End, Lecture Notes in Computer Science, vol.4085, pp.460-475, 2006. ,
DOI : 10.1007/11813040_31
URL : https://hal.archives-ouvertes.fr/inria-00106401
Formal Verification of a C Value Analysis Based on Abstract Interpretation, SAS, pp.324-344, 2013. ,
DOI : 10.1007/978-3-642-38856-9_18
URL : https://hal.archives-ouvertes.fr/hal-00812515
Formal Verification of Loop Bound Estimation for WCET Analysis, Verified Software: Theories, Tools, Experiments -5th International Conference Lecture Notes in Computer Science, 2013. ,
DOI : 10.1007/978-3-642-54108-7_15
URL : https://hal.archives-ouvertes.fr/hal-00848703
Efficient chaotic iteration strategies with widenings, Proceedings of FMPA 1993, pp.128-141, 1993. ,
DOI : 10.1007/BFb0039704
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.3357
PHEBUS: A double ultraviolet spectrometer to observe Mercury's exosphere, Planetary and Space Science, vol.58, issue.1-2, pp.201-223, 2010. ,
DOI : 10.1016/j.pss.2008.05.018
A modular and retargetable framework for tree-based WCET analysis, Proceedings 13th Euromicro Conference on Real-Time Systems, pp.37-44, 2001. ,
DOI : 10.1109/EMRTS.2001.933995
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977. ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/hal-01108790
The ASTRE?? Analyzer, Lecture Notes in Computer Science, vol.3444, pp.21-30, 2005. ,
DOI : 10.1007/978-3-540-31987-0_3
Virgile Prevosto, Julien Signoles, and Boris Yakobowski. Frama-C -a software analysis perspective, In SEFM, pp.233-247, 2012. ,
Efficiently computing static single assignment form and the control dependence graph, ACM Transactions on Programming Languages and Systems, vol.13, issue.4, pp.451-490, 1991. ,
DOI : 10.1145/115372.115320
Understanding Integer Overflow in C/C++, ACM Transactions on Software Engineering and Methodology, vol.25, issue.1, pp.760-770, 2012. ,
DOI : 10.1145/2743019
Operational Refinement for Compiler Correctness, 2012. ,
Modeling complex flows for worst-case execution time analysis, Proceedings 21st IEEE Real-Time Systems Symposium, pp.163-174, 2000. ,
DOI : 10.1109/REAL.2000.896006
A Modular Tool Architecture for Worst-Case Execution Time Analysis, 2003. ,
Deriving WCET bounds by abstract execution, Proc. 11th International Workshop on Worst-Case Execution Time (WCET) Analysis, 2011. ,
Loop bound analysis based on a combination of program slicing, abstract interpretation, and invariant analysis, of OASICS. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, 2007. ,
A compiler framework for the reduction of worst-case execution times. Real-Time Systems [29] Christian Ferdinand and Reinhold Heckmann. aiT: worst case execution time prediction by static program analysis, IFIP Congress Topical Sessions, pp.251-300, 2004. ,
The program dependence graph and its use in optimization, ACM Transactions on Programming Languages and Systems, vol.9, issue.3, pp.319-349, 1987. ,
DOI : 10.1145/24039.24041
Towards formally verified optimizing compilation in flight control software, PPES Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, pp.59-68, 2011. ,
Program slicing, 2008 Frontiers of Software Maintenance, pp.58-67, 2008. ,
DOI : 10.1109/FOSM.2008.4659249
Vers une certification de l'extraction de Coq, 2012. ,
The Mälardalen WCET benchmarks: Past, present and future, Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, pp.136-146, 2010. ,
Automatic Derivation of Loop Bounds and Infeasible Paths for WCET Analysis Using Abstract Execution, 2006 27th IEEE International Real-Time Systems Symposium (RTSS'06), pp.57-66, 2006. ,
DOI : 10.1109/RTSS.2006.12
When the Decreasing Sequence Fails, SAS, pp.198-213, 2012. ,
DOI : 10.1007/978-3-642-33125-1_15
URL : https://hal.archives-ouvertes.fr/hal-00734340
The WCET Analysis Tool CalcWcet167, Lecture Notes in Computer Science, vol.7610, issue.2, pp.158-172, 2012. ,
DOI : 10.1007/978-3-642-34032-1_17
seL4, Communications of the ACM, vol.53, issue.6, pp.107-115, 2010. ,
DOI : 10.1145/1743546.1743574
Symbolic Loop Bound Computation for WCET Analysis, Ershov Memorial Conference, pp.227-242, 2011. ,
DOI : 10.1007/978-3-642-29709-0_20
WCET squeezing, Proceedings of the 21st International conference on Real-Time Networks and Systems, RTNS '13, pp.161-170, 2013. ,
DOI : 10.1145/2516821.2516847
A buffer overflow benchmark for software model checkers, Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering , ASE '07, pp.389-392, 2007. ,
DOI : 10.1145/1321631.1321691
Pipeline Modeling for Timing Analysis, Lecture Notes in Computer Science, vol.2477, pp.294-309, 2002. ,
DOI : 10.1007/3-540-45789-5_22
A fast algorithm for finding dominators in a flowgraph, ACM Transactions on Programming Languages and Systems, vol.1, issue.1, pp.121-141, 1979. ,
DOI : 10.1145/357062.357071
Generating Verifiable Java Code from Verified PVS Specifications, NASA Formal Methods, pp.310-325, 2012. ,
DOI : 10.1007/978-3-642-28891-3_30
Formal certification of a compiler back-end or: programming a compiler with a proof assistant, POPL, pp.42-54, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000963
Formal verification of a realistic compiler, Communications of the ACM, vol.52, issue.7, pp.107-115, 2009. ,
DOI : 10.1145/1538788.1538814
URL : https://hal.archives-ouvertes.fr/inria-00415861
The CompCert C language, 2013. ,
Extraction in Coq: An Overview, CiE, pp.359-369, 2008. ,
DOI : 10.1007/978-3-540-69407-6_39
URL : https://hal.archives-ouvertes.fr/hal-00338973
Performance Analysis of Embedded Software Using Implicit Path Enumeration, 32nd Design Automation Conference, pp.1477-1487, 1997. ,
DOI : 10.1109/DAC.1995.249991
A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models, CGO, pp.136-146, 2009. ,
Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems, 2011. ,
DOI : 10.1007/978-90-481-9929-7
Static Loop Bound Analysis of C Programs Based on Flow Analysis and Abstract Interpretation, 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp.161-166, 2008. ,
DOI : 10.1109/RTCSA.2008.53
Advanced Compiler Design and Implementation, 1997. ,
Signedness-Agnostic Program Analysis: Precise Integer Bounds for Low-Level Code, APLAS, pp.115-130, 2012. ,
DOI : 10.1007/978-3-642-35182-2_9
CIL: Intermediate language and tools for analysis and transformation of C programs, Lecture Notes in Computer Science, vol.2304, pp.213-228, 2002. ,
Principles of program analysis, 1999. ,
DOI : 10.1007/978-3-662-03811-6
Isabelle/HOL -A Proof Assistant for Higher-Order Logic, volume 2283 of Lecture Notes in Computer Science, 2002. ,
PVS: A prototype verification system, Lecture Notes in Computer Science, vol.607, pp.748-752, 1992. ,
DOI : 10.1007/3-540-55602-8_217
TuBound -a conceptually new tool for worst-case execution time analysis, of OASICS. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, 2008. ,
Identifying loops in almost linear time, ACM Transactions on Programming Languages and Systems, vol.21, issue.2, pp.175-188, 1999. ,
DOI : 10.1145/316686.316687
A new foundation for control dependence and slicing for modern program structures, ACM Trans. Program. Lang. Syst, vol.29, issue.5, 2007. ,
A definition and classification of timing anomalies, of OASICS. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, 2006. ,
Developing Safety-Critical Software, 2013. ,
A Formally-Verified Alias Analysis, Lecture Notes in Computer Science, vol.7679, pp.11-26, 2012. ,
DOI : 10.1007/978-3-642-35308-6_5
URL : https://hal.archives-ouvertes.fr/hal-00773109
First Steps towards the Certification of an ARM Simulator Using Compcert, Lecture Notes in Computer Science, vol.35, issue.2, pp.346-361, 2011. ,
DOI : 10.1109/2.982916
URL : https://hal.archives-ouvertes.fr/inria-00624833
A survey of program slicing techniques, J. Prog. Lang, vol.3, issue.3, 1995. ,
Formalizing a Framework for Dynamic Slicing of Program Dependence Graphs in Isabelle/HOL, TPHOLs, pp.294-309, 2008. ,
DOI : 10.1145/1216374.1216375
Program Slicing, IEEE Transactions on Software Engineering, vol.10, issue.4, pp.439-449, 1981. ,
DOI : 10.1109/TSE.1984.5010248
Comparing Mathematical Provers, MKM, pp.188-202, 2003. ,
DOI : 10.1007/3-540-36469-2_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.56
The worst-case execution-time problem???overview of methods and survey of tools, ACM Transactions on Embedded Computing Systems, vol.7, issue.3, 2008. ,
DOI : 10.1145/1347375.1347389
Computation takes time, but how much?, Communications of the ACM, vol.57, issue.2, pp.94-103, 2014. ,
DOI : 10.1145/2500886