Abstract
For the safety of real-time systems, it is very important that the execution time of programs must meet all time constraints, even under the worst case. To expose timeliness defects which may cause an execution timeout as early as possible, we have studied a novel nonlinear approach for estimating worst case execution time (WCET) during programming phase, called NL-WCET. In this paper, we propose a program features model, based on which NL-WCET employs least square support vector machine (LSSVM) to learn the program features, and then estimates WCET. To improve the accuracy of NL-WCET, we develop an algorithm for training samples optimization. The experimental results show that both the model and the algorithm have distinct effects on the accuracy of NL-WCET. When static similarity is \(\ge \)80 %, cosine similarity is \(\ge \)99.5 % and max quotient between corresponding items is \(\le \)50, the average error of NL-WCET is merely 0.82 %, quite lower than conventional WCET measurement. Meanwhile it also has higher efficiency than conventional WCET analysis. Thus NL-WCET is suitable for being used during programming phase, and can help programmers to discover timeliness defects as early as possible.
Similar content being viewed by others
References
Asensio, E., Lafoz, I., Coombes, A.: Worst-case execution time analysis approach for safety-critical airborne software. In: International Conference on Reliable Software Technologies, pp. 161–176. Springer, Heidelberg (2013)
Huang, Y., Zhao, M., XueChun, J.: Joint WCET and update activity minimization for cyber–physical systems. ACM Trans Embed. Comput. Syst. 14(1), 6–33 (2015)
Černý, P., Henzinger, T.A., Kovács, L.: Segment abstraction for worst-case execution time analysis. In: European Symposium on Programming Languages and Systems, pp. 105–131. Springer, Heidelberg (2015)
Biondi, A., Buttazzo, G.C., Bertogna, M.: Schedulability analysis of hierarchical real-time systems under shared resources. IEEE Trans. Comput. 65(5), 1593–1605 (2016)
Lee, A.: Cyber physical systems: design challenges. In: IEEE ISORC’2008, pp. 363–369 (2008)
Kozyrev, P.: Estimation of the execution time in real-time systems. Program. Comput. Softw. 42(1), 41–48 (2016)
Andalam, S., Roop, S., Girault, A.: A predictable framework for safety-critical embedded systems. IEEE Trans. Comput. 63(7), 1600–1612 (2014)
Moy, Y., Ledinot, E., Delseny, H.: Testing or formal verification: Do-178c alternatives and industrial experience. IEEE Softw. 30(3), 50–57 (2013)
Kästner, D., Ferdinand, C.: Static verification of non-functional software requirements in the ISO-26262. Automot. Saf. Secur. 14(1), 39–53 (2012)
Perez, J., Gonzalez, D., Trujillo, S.: A safety concept for an IEC-61508 compliant fail-safe wind power mixed-criticality system based on multicore and partitioning. In: International Conference on Reliable Software Technologies, pp. 3–17 Springer, Heidelberg (2015)
Wilhelm, R., Grund, D.: Computation takes time, but how much? Commun. ACM 57(2), 94–103 (2014)
Sahuquillo, J., Hassan, H., Petit, S.: A dynamic execution time estimation model to save energy in heterogeneous multicores running periodic tasks. Future Gener. Comput. Syst. 56, 211–219 (2016)
Wilhelm, R., Engblom, J., Ermedahl, A.: The worst-case execution-time problem—overview of methods and survey of tools. ACM Trans. Embed. Comput. Syst. 7(3), 36–89 (2008)
Altmeyer, S., Douma, R., Lunniss, W.: On the effectiveness of cache partitioning in hard real-time systems. Real-Time Syst. 52(5), 598–643 (2016)
Hardy, D., Puaut, I.: Static probabilistic worst case execution time estimation for architectures with faulty instruction caches. Real-Time Syst. 51(2), 128–152 (2015)
Guan, N., Lv, M., Yi, W.: WCET analysis with MRU cache: challenging LRU for predictability. ACM Trans. Embed. Comput. Syst. 13(4s), 123–131 (2014)
Zolda, M., Kirner, R.: Calculating WCET estimates from timed traces. Real-Time Syst. 52(1), 38–87 (2016)
Li, X., Liang, Y., Mitra, T.: Chronos: a timing analyzer for embedded software. Sci. Comput. Program. 69(1), 56–67 (2007)
Huber, B., Prokesch, D., Puschner, P.: Combined WCET analysis of bitcode and machine code using control-flow relation graphs. ACM SIGPLAN Notices 48(5), 163–172 (2013)
Henry, J., Asavoae, M., Monniaux, D.: How to compute worst-case execution time by optimization modulo theory and a clever encoding of program semantics. ACM SIGPLAN Notices 49(5), 43–52 (2014)
Theiling, H.: Extracting safe and precise control flow from binaries. In: IEEE RTCSA’2000, pp. 23–30 (2000)
Parsa, S., Sakhaei-Nia, M.: PLEA: parametric loop bound estimation in WCET analysis. Turk. J. Electr. Eng. Comput. Sci. 24(4), 2135–2149 (2016)
Blackham, B., Liffiton, M., Heiser, G.: Trickle: automated infeasible path detection using all minimal unsatisfiable subsets. In: IEEE RTAS’2014, pp. 169–178 (2014)
Harmon, T., Schoeberl, M., Kirner, R.: Fast, interactive worst-case execution time analysis with back-annotation. IEEE Trans. Ind. Inf. 8(2), 366–377 (2012)
Schoeberl, M.: JOP: a Java optimized processor. In: International Conferences on “On the Move to Meaningful Internet Systems”, pp. 346–359. Springer, Heidelberg (2003)
Rios, R., Schoeberl, M.: An evaluation of safety-critical Java on a Java processor. In: IEEE ISORC’2014, pp. 276–283 (2014)
Ghaedi, M., Ghaedi, A.M., Hossainpour, M.: Least square-support vector (LS-SVM) method for modeling of methylene blue dye adsorption using copper oxide loaded on activated carbon: Kinetic and isotherm study. J. Ind. Eng. Chem. 20(4), 1641–1649 (2014)
Mahmoodi, N.M., Arabloo, M., Abdi, J.: Laccase immobilized manganese ferrite nanoparticle: synthesis and LSSVM intelligent modeling of decolorization. Water Res. 67, 216–226 (2014)
Ahmadi, M.A., Bahadori, A.: A LSSVM approach for determining well placement and conning phenomena in horizontal wells. Fuel 153, 276–283 (2015)
Xuan, J., Luo, X., Zhang, G., Lu, J., Xu, Z.: Uncertainty analysis for the keyword system of web events. IEEE Trans. Syst. Man Cybern. Syst. 46(6), 829–842 (2016)
Xu, Z., Mei, L., Hu, C., Liu, Y.: The big data analytics and applications of the surveillance system using video structured description technology. Cluster Comput. doi:10.1007/s10586-016-0581-x
Zhou, W., Zhou, Y., Jiang, X.: Detecting repackaged smartphone applications in third-party android marketplaces. In: ACM CODASPY’2012, pp. 317–326 (2012)
Healy, J., Chambers, D.: Approximate k-mer matching using fuzzy hash maps. IEEE/ACM Trans. Comput. Biol. Bioinf. 11(1), 258–264 (2014)
Liangliang, K., Jianhui, J., Jie, X.: Simulation-based non-linear methods for the estimation of execution cycles of ARM programs. J. Comput. Res. Dev. 49(2), 392–401 (2012)
Liao, H., Xu, Z.: Approaches to manage hesitant fuzzy linguistic information based on the cosine distance and similarity measures for HFLTSs and their application in qualitative decision making. Expert Syst. Appl. 42(12), 5328–5336 (2015)
Ye, J.: Improved cosine similarity measures of simplified neutrosophic sets for medical diagnoses. Artif. Intell. Med. 63(3), 171–179 (2015)
Navarro, G.: A guided tour to approximate string matching. ACM Comput. Surv. (CSUR) 33(1), 31–88 (2001)
Schulz, U., Mihov, S.: Fast string correction with Levenshtein automata. Int. J. Doc. Anal. Recogn. 5(1), 67–85 (2002)
Zhou, S.: Sparse LSSVM in primal using Cholesky factorization for large-scale problems. IEEE Trans. Neural Netw. Learn. Syst. 27(4), 783–795 (2016)
Ying, Z., Keong, C.: Fast leave-one-out evaluation and improvement on inference for LS-SVMs. In : IEEE ICPR’2004, pp. 494–497 (2004)
Yoo, J., Lee, J., Hong, S.: Petri net-based FTL architecture for parametric WCET estimation via FTL operation sequence derivation. IEEE Trans. Comput. 62(11), 2238–2251 (2013)
Burns, F., Koelmans, A., Yakovlev, A.: Wcet analysis of superscalar processors using simulation with coloured petri nets. Real-Time Syst. 18(2), 275–288 (2000)
Rust, C., Stappert, F., Bernhardi-Grisson, R.: Petri net based design of reconfigurable embedded real-time systems. In: Design and Analysis of Distributed Embedded Systems, pp. 41–50. Springer New York (2002)
Stappert, F., Rust, C.: Worst case execution time analysis for petri net models of embedded systems. In: Embedded Systems and Applications, pp. 176–182 (2003)
Coffman, J., Healy, C., Mueller, F.: Generalizing parametric timing analysis. ACM SIGPLAN Notices 42(7), 152–154 (2007)
Mohan, S., Mueller, F., Root, M.: Parametric timing analysis and its application to dynamic voltage scaling. ACM Trans. Embed. Comput. Syst. 10(2), 25–51 (2010)
Altmeyer, S., Humbert, C., Lisper, B.: Parametric timing analysis for complex architectures. In: IEEE RTCSA’2008, pp. 367–376 (2008)
Sarkar, M., Mondal, T., Roy, S.: Resource requirement prediction using clone detection technique. Future Gener. Comput. Syst. 29(4), 936–952 (2013)
Acknowledgments
This work was supported by the national natural science foundation of China (No. 61173021 and No. 51277023).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Meng, F., Su, X. & Qu, Z. Nonlinear approach for estimating WCET during programming phase. Cluster Comput 19, 1449–1459 (2016). https://doi.org/10.1007/s10586-016-0606-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-016-0606-5