-
1
-
-
0003515463
-
-
Prentice-Hall
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network flows: Theory, Algorithms, and Applications. Prentice-Hall, 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
4
-
-
84880406176
-
Computing the maximum blocking time for scheduling with deferred preemption
-
S. Altmeyer, C. Maiza-Burguiére, and R. Wilhelm. Computing the Maximum Blocking Time for Scheduling with Deferred Preemption. In Proc. of STFSSD, 2009.
-
(2009)
Proc. of STFSSD
-
-
Altmeyer, S.1
Maiza-Burguiére, C.2
Wilhelm, R.3
-
5
-
-
84884694443
-
Scope-tree: A program representation for symbolic worst-case execution time analysis
-
A. Colin and G. Bernat. Scope-Tree: A Program Representation for Symbolic Worst-Case Execution Time Analysis. In Proc. of ECRTS, 2002.
-
(2002)
Proc. of ECRTS
-
-
Colin, A.1
Bernat, G.2
-
7
-
-
0002924235
-
Finding the k shortest paths
-
D. Eppstein. Finding the K Shortest Paths. In Proc. of FOCS, 1994.
-
(1994)
Proc. of FOCS
-
-
Eppstein, D.1
-
9
-
-
0031186224
-
Nesting of reducible and irreducible loops
-
P. Havlak. Nesting of Reducible and Irreducible Loops. TOPLAS, 19(4):557-567, 1997.
-
(1997)
TOPLAS
, vol.19
, Issue.4
, pp. 557-567
-
-
Havlak, P.1
-
10
-
-
0031274168
-
Making graphs reducible with controlled node splitting
-
J. Janssen and H. Corporaal. Making Graphs Reducible with Controlled Node Splitting. TOPLAS, 19(6):1031-1052, 1997.
-
(1997)
TOPLAS
, vol.19
, Issue.6
, pp. 1031-1052
-
-
Janssen, J.1
Corporaal, H.2
-
12
-
-
0029233511
-
Performance analysis of embedded software using implicit path enumeration
-
Y.-T. S. Li and S. Malik. Performance Analysis of Embedded Software using Implicit Path Enumeration. In Proc. of DAC, 1995.
-
(1995)
Proc. of DAC
-
-
Li, Y.-T.S.1
Malik, S.2
-
13
-
-
33747876676
-
Advanced compiler design and implementation
-
S. S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann, 1997.
-
(1997)
Morgan Kaufmann
-
-
Muchnick, S.S.1
-
14
-
-
0034448304
-
On loops, dominators, and dominance frontiers
-
G. Ramalingam. On Loops, Dominators, and Dominance Frontiers. TOPLAS, 35(5):233-241, 2002.
-
(2002)
TOPLAS
, vol.35
, Issue.5
, pp. 233-241
-
-
Ramalingam, G.1
-
15
-
-
85008255513
-
Efficient longest executable path search for programs with complex flows and pipeline effects
-
F. Stappert, A. Ermedahl, and J. Engblom. Efficient Longest Executable Path Search for Programs with Complex Flows and Pipeline Effects. In Proc. of CASES, 2001.
-
(2001)
Proc. of CASES
-
-
Stappert, F.1
Ermedahl, A.2
Engblom, J.3
-
16
-
-
0019588127
-
A unified approach to path problems
-
R. E. Tarjan. A Unified Approach to Path Problems. J. ACM, 28(3):577-593, 1981.
-
(1981)
J. ACM
, vol.28
, Issue.3
, pp. 577-593
-
-
Tarjan, R.E.1
-
17
-
-
0033750056
-
Fast and precise WCET prediction by separated cache and path analyses
-
H. Theiling, C. Ferdinand, and R. Wilhelm. Fast and Precise WCET Prediction by Separated Cache and Path Analyses. RTS, 18(2/3):157-179, 2000.
-
(2000)
RTS
, vol.18
, Issue.2-3
, pp. 157-179
-
-
Theiling, H.1
Ferdinand, C.2
Wilhelm, R.3
-
18
-
-
0039488519
-
Handling irreducible loops: Optimized node splitting versus DJ-graphs
-
July
-
S. Unger and F. Mueller. Handling Irreducible Loops: Optimized Node Splitting versus DJ-Graphs. ACM Trans. Program. Lang. Syst., 24(4):299-333, July 2002.
-
(2002)
ACM Trans. Program. Lang. Syst
, vol.24
, Issue.4
, pp. 299-333
-
-
Unger, S.1
Mueller, F.2
-
19
-
-
43949126892
-
The worst-case execution time problem - overview of methods and survey of tools
-
R. Wilhelm, J. Engblom, et al. The Worst-Case Execution Time Problem - Overview of Methods and Survey of Tools. TECS, 7(3):36:1-36:53, 2008.
-
(2008)
TECS
, vol.7
, Issue.3
, pp. 1-53
-
-
Wilhelm, R.1
Engblom, J.2
|