[. Bibliographie, O. Adams, and . Agesen, A comparison of software and hardware techniques for x86 virtualization, ACM Sigplan Notices, vol.41, issue.11, pp.2-13, 2006.

[. Ali, . Briand, R. Hemmati, and . Panesar-walawege, A Systematic Review of the Application and Empirical Investigation of Search-Based Test Case Generation, IEEE Transactions on Software Engineering, vol.36, issue.6, pp.742-762, 2010.
DOI : 10.1109/TSE.2009.52

J. Arlat, A. Costes, J. Blanquart, and J. Laprie, Guide de la sûreté de fonctionnement. Cépaduès-éditions, 1996.

F. Armand and M. Gien, A Practical Look at Micro-Kernels and Virtual Machine Monitors, 2009 6th IEEE Consumer Communications and Networking Conference, 2009.
DOI : 10.1109/CCNC.2009.4784874

[. Amsellem, L. Noyer, M. Bourgeois, and . Hossaert-mckey, Comparison of genetic diversity of the invasive weed Rubus alceifolius Poir. (Rosaceae) in its native range and in areas of introduction, using amplified fragment length polymorphism (AFLP) markers, Molecular Ecology, vol.41, issue.4, pp.443-455, 2000.
DOI : 10.1016/0169-5347(93)90007-C

R. Barry, Using the freertos real time kernel a practical guide, 2010.

[. Barthe, G. Betarte, J. D. Campo, and C. Luna, Formally Verifying Isolation and Availability in an Idealized Model of Virtualization, FM 2011 : Formal Methods, pp.231-245, 2011.
DOI : 10.1007/s10207-004-0057-5

K. Barr, P. Bungale, S. Deasy, V. Gyuris, P. Hung et al., The VMware mobile virtualization platform, ACM SIGOPS Operating Systems Review, vol.44, issue.4, pp.124-135, 2010.
DOI : 10.1145/1899928.1899945

. Boggess, . Carr, . Evans, . Fischel, C. Hr-freeman et al., The IUE spacecraft and instrumentation, Nature, vol.40, issue.5679, pp.372-377, 1978.
DOI : 10.1038/275369a0

J. Benedicto, . Dinwiddy, . Gatti, M. Lucas, and . Lugert, Galileo : Satellite system design, 2000.

C. Belleval, I. Deniaud, and C. Lerch, Modèle de conception à base de réseau de contradictions. le cas de la conception des microsatellites au cnes Information Science for Decision Making, 2010.

F. Bellard, Qemu open source processor emulator, 2007.

B. Philippe, Le telescope spatial hubble, 1997.

J. Brygier, R. Fuchsen, and H. Blasum, Pikeos : Safe and secure virtualization in a separation microkernel, 2009.

G. Bouffard, J. Iguchi-cartigny, and J. Lanet, Combined Software and Hardware Attacks on the Java Card Control Flow, Smart Card Research and Advanced Applications, pp.283-296, 2011.
DOI : 10.1007/978-3-642-27257-8_18

URL : https://hal.archives-ouvertes.fr/hal-00684616

M. [. Bueno and . Jino, Identification of potentially infeasible program paths by monitoring the search for test data, Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering, pp.209-218, 2000.
DOI : 10.1109/ASE.2000.873665

[. Bian, J. Jin, and Z. Fang, The Beidou Satellite Positioning System and Its Positioning Accuracy, Navigation, vol.52, issue.3, pp.123-129, 2005.
DOI : 10.1002/j.2161-4296.2005.tb01739.x

I. Bate and U. Khan, WCET analysis of modern processors using multi-criteria optimisation, Empirical Software Engineering, vol.7, issue.3, pp.5-28, 2010.
DOI : 10.1007/s10664-010-9133-9

A. Boudou, Essai de vmware fusion, 2007.

[. Brash, Extensions to the ARMv7-A architecture, 2010 IEEE Hot Chips 22 Symposium (HCS), 2010.
DOI : 10.1109/HOTCHIPS.2010.7480070

A. Burns, Scheduling hard real-time systems: a review, Software Engineering Journal, vol.6, issue.3, pp.116-128, 1991.
DOI : 10.1049/sej.1991.0015

[. Bunte, M. Zolda, and R. Kirner, Let's get less optimistic in measurement-based timing analysis, 2011 6th IEEE International Symposium on Industrial and Embedded Systems, pp.204-212, 2011.
DOI : 10.1109/SIES.2011.5953663

G. Canivet, Analyse des effets d'attaques par fautes et conception sécurisée sur plate-forme reconfigurable, 2009.

B. Cilku, A. Crespo, P. Puschner, J. Coronel, and S. Peiro, A memory arbitration scheme for mixed-criticality multicore platforms, Proc. 2nd Workshop on Mixed Criticality Systems (WMC), RTSSCFLH06] Ying-wu Chen, Yan-shen Fang, Ju-fang Li, and Ren-jie HE. Constraint programming model of satellite mission scheduling. JOURNAL-NATIONAL UNIVERSITY OF DEFENSE TECHNOLOGY, pp.27-32126, 2006.

A. Colin and I. Puaut, A modular and retargetable framework for treebased wcet analysis, Real-Time Systems, 13th Euromicro Conference on, pp.37-44, 2001.

A. Colin, M. Stefan, and . Petters, Experimental evaluation of code properties for WCET analysis, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), 2003.
DOI : 10.1109/REAL.2003.1253266

R. James, . Clapper, J. John, . Young, E. James et al., Fy2009-2034 unmanned systems integrated roadmap, 2009.

R. James, . Clapper, J. John, . Young, E. James et al., Fy2013-2034 unmanned systems integrated roadmap, 2013.

A. Das and R. Cobb, Techsat 21-space missions using collaborating constellations of satellites, 1998.

T. Dybå and T. Dingsøyr, Empirical studies of agile software development : A systematic review Information and software technology, pp.833-859, 2008.

A. Dessiatnikoff, Y. Deswarte, E. Alata, and V. Nicomette, Potential Attacks on Onboard Aerospace Systems, IEEE Security & Privacy, vol.10, issue.4, pp.71-74, 2012.
DOI : 10.1109/MSP.2012.104

A. Dehbaoui, Analyse Sécuritaire des Émanations Électromagnétiques des Circuits Intégrés, 2011.

N. Durand and J. Gotteland, Algorithmes génétiques appliqués à la gestion du trafic aérien Plan de l ' exposé

[. Dwork, M. Herlihy, and O. Waarts, Contention in shared memory algorithms, Journal of the ACM, vol.44, issue.6, pp.779-805, 1997.
DOI : 10.1145/268999.269000

C. De and N. , Techniques d'analyse de défaillance de circuits intégrés appliquées au descrambling et à la lecture de données sur des composants mémoires non volatiles, 2009.

D. Eklov, N. Nikoleris, D. Black-schaffer, and E. Hagersten, Bandwidth bandit: Understanding memory contention, 2012 IEEE International Symposium on Performance Analysis of Systems & Software, pp.116-117, 2012.
DOI : 10.1109/ISPASS.2012.6189214

R. Daniel and . Ferstay, Fast secure virtualization for the arm platform, 2006.

O. Faurax and L. Freund, Frédéric Bancel, and Traian Muntean Une méthode générique pour l'injection de fautes dans les circuits, Actes des 9èmes Journées Nationales du Réseau Doctoral en Microélectronique, 2006.

L. Wendy, . Freedman, F. Barry, . Madore, K. Brad et al., Final results from the hubble space telescope key project to measure the hubble constant Analysis of the intel pentium's ability to support a secure virtual machine monitor, For00] US Air Force, p.47, 2000.

L. Fribourg, R. Soulat, D. Lesens, and P. Moro, Robustness Analysis for Scheduling Problems Using the Inverse Method, 2012 19th International Symposium on Temporal Representation and Reasoning, pp.73-80, 2012.
DOI : 10.1109/TIME.2012.10

[. Fufa, C. Zhao-bo, and M. Wensheng, Modeling and Simulation of Satellite Solar Panel Deployment and Locking, Information Technology Journal, vol.9, issue.3, pp.600-604, 2010.
DOI : 10.3923/itj.2010.600.604

[. Génétiques, Les algorithmes génétiques, pp.1-31, 2005.

J. Gustafsson, A. Betts, A. Ermedahl, and B. Lisper, The Mälardalen WCET Benchmarks : Past, Present And Future, 10th International Workshop on Worst-Case Execution Time AnalysisGE02] Robin Gubby and John Evans. Space environment effects and satellite design, pp.136-146, 2010.

V. Giri, S. Giri, A. Gregory, S. Price, and . Zekavat, Generic sdr architecture : Vendor independent implementation, Aerospace Conference, pp.1723-1733, 2002.

G. Grimaud, J. Iguchi-cartigny, and P. Buret, Genetic algorithm for DWCET Evaluation on complex platform, IEEE International Symposium on Industrial Embedded Systems, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01131239

G. Grimaud, J. Iguchi-cartigny, and P. Buret, Contexte d'exécution dans la recherche de pire temps d'exécution d'un système complexe, Compas'15, 2015.

[. Grandjean and F. Lecouat, Scheduling and plan execution : from ground segment automation to autonomous spacecraft operation concepts, Proceedings of the On-Autonomy Workshop, ESTEC, pp.17-19, 2001.

E. David and . Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, 1989.

[. Gross, An evaluation of dynamic, optimisation-based worst-case execution time analysis, Proceedings of the International Conference on, 2003.

S. Guilley, Contre-mesures géométriques aux attaques exploitant les canaux cachés, 2007.

M. Harman, The Current State and Future of Search Based Software Engineering The Current State and Future of Search Based Software Engineering, 2007.

[. Haworth, Military satellite communications. IEE telecommunications series, pp.296-328, 1991.

D. Jerry, . Holmes, S. Kenneth, A. Barron, and . Reid, Jamming suppression of spread spectrum antenna/receiver systems, US Patent, vol.6141, p.371, 2000.

G. Heiser, Hypervisors for Consumer Electronics, 2009 6th IEEE Consumer Communications and Networking Conference, pp.1-5, 2009.
DOI : 10.1109/CCNC.2009.4784922

G. Heiser and B. Leslie, The OKL4 microvisor, Proceedings of the first ACM asia-pacific workshop on Workshop on systems, APSys '10, pp.19-24, 2010.
DOI : 10.1145/1851276.1851282

S. Holmbacka, Task migration in virtualized multi-core real-time systems, 2010.

J. Honeycutt, Microsoft virtual pc 2004 technical overview, 2003.

H. Casse and P. Sainrat, OTAWA, a framework for experimenting WCET computations, pp.1-8, 2006.

[. Inam, J. Mäki-turja, M. Sjödin, and M. Behnam, Hard real-time support for hierarchical scheduling in freertos, 23rd Euromicro Conference on Real-Time Systems, pp.51-60, 2011.

A. Iqbal, N. Sadeque, and R. I. Mutia, An overview of microkernel, hypervisor and microvisor virtualization approaches for embedded systems, Report, 2009.

J. Isnard, La belgique rejoint la france dans le project de satellite-espion militaire hélios 2, Le Monde, p.3, 2001.

D. Jaramillo, B. Furht, and A. Agarwal, Virtualization techniques for mobile devices, International Review on Computers & Software, vol.8, issue.8, p.2013

S. David and . Johnson, A Theoretician's Guide to the Experimental Analysis of Algorithms, pp.1-36, 2001.

[. Jones, virtualization for embedded systems. The how and why of smalldevice hypervisors, 2011.

S. Mark, . Johnstone, R. Paul, and . Wilson, The memory fragmentation problem : solved ?, In ACM SIGPLAN Notices, vol.34, pp.26-36, 1998.

[. Kan, The machine scheduling problem Interfaculty for Graduate Studies in Management, 1973.

W. Young, . Kwon, N. Luke, R. Brewer, . Panholzer et al., Direct manufacturing of cubesat using 3-d digital printer and determination of its mechanical properties, 2010.

[. King-hele and E. Quinn, Table of the earth satellites launched in 1965, Planetary and Space Science, vol.14, issue.9, pp.817-838, 1966.
DOI : 10.1016/0032-0633(66)90089-4

K. Bernhard, The electrical power system of fhe small satellite champ, ESA SP, pp.383-388, 2002.

J. Kiszka, Towards linux as a real-time hypervisor, Proceedings of the 11th Real-Time Linux Workshop, pp.215-224, 2009.

O. Kömmerling, G. Markus, and . Kuhn, Design principles for tamper-resistant smartcard processors, USENIX workshop on Smartcard Technology, pp.9-20, 1999.

D. Kleidermacher and M. Kleidermacher, Embedded systems security : practical methods for safe and secure software and systems development, 2012.

P. Kocher, R. Lee, and G. Mcgraw, Anand Raghunathan, and Srivaths Moderator-Ravi. Security as a new dimension in embedded system design, Proceedings of the 41st annual Design Automation Conference, pp.753-760, 2004.

D. Leslie, . Kohn, A. Kunle, . Olukotun, K. Michael et al., Multi-core multi-thread processor, p.996, 0209.

. P. Kwhm, D. Kulkarni, C. Whalley, F. Healy, and . Mueller, Tuning the WCET of embedded applications, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, pp.472-481, 2004.

[. Kirner, I. Wenzel, B. Rieder, and P. Puschner, Using Measurements as a Complement to Static Worst-Case Execution Time Analysis

P. Langereux, L'italie et l'espagne s' associent au satellite français hélios, Air et Cosmos, p.44, 1139.

A. Simon-lee, A. Hutputanasin, W. Toorian, R. Lan, and . Munakata, Cubesat design specification. The CubeSat Program, 2009.

M. Lange, S. Liebergeld, A. Lackorzynski, A. Warg, and M. Peter, L4Android, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.39-50, 2011.
DOI : 10.1145/2046614.2046623

R. Munakata, Cubesat design specification rev. 12. The CubeSat Program, 2009.

J. Martin, Communications satellite systems, 1978.

A. Marref, Evolutionary Algorithms for Parametric WCET Analysis, pp.1-24, 2012.

P. Mcminn, R. Court, and P. Street, Search-based software test data generation: a survey, Software Testing, Verification and Reliability, vol.14, issue.2, pp.1-58, 2004.
DOI : 10.1002/stvr.294

K. Jonathan and . Millen, Covert channel capacity, 1987.

T. Monnier, Durcissement de circuits convertisseurs a/n rapides fonctionnant en environnement spatial, 1999.

M. Masmano, I. Ripoll, A. Peiró, and . Crespo, Xtratum for leon3 : an open source hypervisor for high integrity systems, European Conference on Embedded Real Time Software and Systems. ERTS2, 2010.

C. Kevin, E. V. Mccarthy, . Uhlmann, and . Lynam, Complete mirrorbased global-positioning system (gps) navigation solution, US Patent, vol.6, p.477464, 2002.

[. Marx and H. Laporte-weywada, Ariane 5 - A new launcher for the 90's, 20th Joint Propulsion Conference, 1984.
DOI : 10.2514/6.1984-1226

F. Mueller and J. Wegener, A comparison of static analysis and evolutionary testing for the verification of timing constraints, Proceedings. Fourth IEEE Real-Time Technology and Applications Symposium (Cat. No.98TB100245), 1998.
DOI : 10.1109/RTTAS.1998.683198

A. Nguyen, Les échanges technologiques entre la france et les états-unis : les télécommunications spatiales (1960-1985). Flux, pp.17-24, 2001.

M. Huu-nguyen, Sécurisation de processeurs vis-à-vis des attaques par faute et par analyse de la consommation, 2011.

I. Nason, J. Puig-suari, and R. Twiggs, Development of a family of picosatellite deployers based on the CubeSat standard, Proceedings, IEEE Aerospace Conference, pp.1-457, 2002.
DOI : 10.1109/AERO.2002.1036865

G. Bouffard and J. Boutet, Cartes à puce : Attaques et contremesures, MajecSTIC, vol.16, p.1112, 2009.

L. Parks, Cultures in orbit : Satellites and the televisual, 2005.
DOI : 10.1215/9780822386742

J. Gerald, . Popek, P. Robert, and . Goldberg, Formal requirements for virtualizable third generation architectures, Communications of the ACM, vol.17, issue.7, pp.412-421, 1974.

C. Joseph, F. Pemberton, and . Galiber, A constraint-based approach to satellite scheduling, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol.57, pp.101-114, 2001.

M. [. Pargas, R. R. Harrold, and . Peck, Test-data generation using genetic algorithms, Software Testing, Verification and Reliability, vol.8, issue.4, pp.263-282, 1999.
DOI : 10.1002/(SICI)1099-1689(199912)9:4<263::AID-STVR190>3.0.CO;2-Y

V. Polischuk, . Kozlov, A. Vv-ilitchov, . Kozlov, . Va-bartenev et al., The global navigation satellite system glonass : Development and usage in the 21st century, 2002.

P. Vincent and S. Thierry, L'europe et astrium vers la station spatiale internationale : La mission jules verne, Essais & simulations, issue.99, pp.42-44, 2009.

J. Puig-suari, C. Turner, and W. Ahlgren, Development of the standard CubeSat deployer and a CubeSat class PicoSatellite, 2001 IEEE Aerospace Conference Proceedings (Cat. No.01TH8542), pp.1-347, 2001.
DOI : 10.1109/AERO.2001.931726

[. Puschner and T. Universita, Calculating the maximum execution time of real-time programs, Real-Time Systems, vol.20, issue.1, pp.159-176, 1989.
DOI : 10.1007/BF00571421

I. Puaut, Wcet-centric software-controlled instruction caches for hard realtime systems, Real-Time Systems 18th Euromicro Conference on, p.10, 2006.

D. Rohret and J. Holston, Exploitation of blue team satcom and milsat assets for red team covert exploitation and back-channel communications, International Conference on Information Warfare and Security Academic Conferences International Limited, p.288, 2010.

[. Roy, M. J. Harrold, and R. R. Peck, Test Data Generation Using Genetic Algorithms, Journal of Software Testing, Verification and Reliability, p.19, 1999.

[. Raj and K. Schwan, High performance and scalable I/O virtualization via self-virtualized devices, Proceedings of the 16th international symposium on High performance distributed computing , HPDC '07, pp.179-188, 2007.
DOI : 10.1145/1272366.1272390

N. Mahendra-ramachandran, M. Smith, S. Wood, J. Garg, E. Stanley et al., New client virtualization usage models using intel virtualization technology, Intel Technology Journal, vol.10, issue.3, 2006.

G. Timothy, . Reddin, S. David, J. S. Walsh, and . Round, Parallel computer having mac-relay layer snooped transport header to determine if a message should be routed directly to transport layer depending on its destination, p.121, 1996.

[. Savelsberg, Abstract, Journal of Military Studies, vol.3, issue.1, p.2013
DOI : 10.1515/jms-2016-0182

J. E. Smith, T. C. Bartley, and . Fogarty, Microprocessor design verification by twophase evolution of variable length tests, Proceedings of the IEEE International Conference on Evolutionary Computation, pp.453-458, 1997.

M. Sevilla, Host?based intrusion detection system using the leon3

A. Silberschatz, B. Peter, G. Galvin, A. Gagne, and . Silberschatz, Operating system concepts, 1998.

J. Straub, C. Korvald, A. Nervold, A. Mohammad, N. Root et al., OpenOrbiter: A Low-Cost, Educational Prototype CubeSat Mission Architecture, Machines, vol.1, issue.1, pp.1-32, 2013.
DOI : 10.3390/mach1010001

D. Delbert and . Smith, Legal ordering of satellite telecommunication : Problems and alternatives, the, Ind. LJ, vol.44, p.337, 1968.

A. Specification, 653-2 : Avionics application software standard interface : Part 1-required services, Avionics Electronic Engineering Committee (ARINC), 2006.

J. Strnadel and P. Rajnoha, Reflecting RTOS Model During WCET Timing Analysis: MSP430/Freertos Case Study, Acta Electrotechnica et Informatica, vol.12, issue.4, pp.17-29, 2012.
DOI : 10.2478/v10198-012-0041-3

R. Sen and Y. Srikant, WCET estimation for executables in the presence of data caches, Proceedings of the 7th ACM & IEEE international conference on Embedded software , EMSOFT '07, pp.203-212, 2007.
DOI : 10.1145/1289927.1289960

B. Paul and . Stares, The militarization of space : Us policy, 1945.

J. Sugerman, G. Venkitachalam, and B. Lim, Virtualizing i/o devices on vmware workstation's hosted virtual machine monitor, USENIX Annual Technical Conference, pp.1-14, 2001.

L. Tan, The Worst Case Execution Time Tool Challenge 2006: The External Test, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006)
DOI : 10.1109/ISoLA.2006.73

A. Keith, . Temple, W. Oved, and . Hanson, Method of determining refrigerant charge level in a space temperature conditioning system, Second International Symposium on Leveraging Applications of Formal Methods Sthamer, S. Wappler, and J. Wegener. Improving Evolutionary, pp.241-248, 2003.

T. Vallée, Présentation des algorithmes génétiques et de leurs applications en économie, pp.1-23, 1995.

P. Varnoteaux, La part du cnrs dans les débuts de la conquête de l'espace (1945-1965) La revue pour l, histoire du CNRS, issue.6, 2002.

[. Vladimirova, R. Banu, and M. Sweeting, On-board security services in small satellites, MAPLD Proceedings, 2005.

J. Vercheval, Les 25 ans du lancement du 1er satellite artificiel : De spoutnik 1 à columbia, Ciel et Terre, vol.98, p.293, 1982.

E. Vetillard and A. Ferrari, Combined Attacks and Countermeasures, Smart Card Research and Advanced Application, pp.133-147, 2010.
DOI : 10.1007/978-3-642-12510-2_10

URL : https://hal.archives-ouvertes.fr/hal-01056108

F. Vahid and T. Givargis, Embedded system design : a unified hardware/software introduction, 2002.

P. Varanasi and G. Heiser, Hardware-supported virtualization on ARM, Proceedings of the Second Asia-Pacific Workshop on Systems, APSys '11, p.11, 2011.
DOI : 10.1145/2103799.2103813

A. Villemeur, Sûreté de fonctionnement des systèmes industriels, 1988.

E. J. Tanja, F. F. Vos, B. Lindlar, A. Wilmes, A. I. Windisch et al., Evolutionary functional black-box testing in an industrial setting, Software Quality Journal, vol.21, issue.2, pp.259-288, 2012.

[. Vmware and . Server, [vSH07] Carl van Schaik and Gernot Heiser. High-performance microkernels and virtualisation on arm and segmented architectures, Proceedings of the 1st International Workshop on Microkernels for Embedded Systems, 2005.

A. Velte and T. Velte, Microsoft virtualization with Hyper-V, 2009.

[. Von, G. Zur, D. Wilhelm, and J. Engblom, Calculs d'attitude avec un capteur stellaire. mars and Per Stenstr. The Worst-Case Execution Time Problem ? Overview of Methods and Survey of Tools, pp.119-1271, 1998.

G. Thomas and . Whitten, Method and computer program product for generating a computer program product test that includes an optimized set of computer program product test cases, and method for selecting same, p.795, 1998.

C. Wang, S. Hu, H. Kim, R. Sreekumar, M. B. Nair et al., StarDBT: An Efficient Multi-platform Dynamic Binary Translation System, Advances in Computer Systems Architecture, pp.4-15, 2007.
DOI : 10.1007/978-3-540-74309-5_3

J. Joachim and . Wlodarz, Virtualization : A double-edged sword. arXiv preprint, 2007.

[. Wenzel, B. Rieder, R. Kirner, and P. Puschner, Automatic Timing Model Generation by CFG Partitioning and Model Checking, Design, Automation and Test in Europe, pp.606-611, 2005.
DOI : 10.1109/DATE.2005.76

URL : https://hal.archives-ouvertes.fr/hal-00181658

A. Whitaker, M. Shaw, D. Steven, and . Gribble, Denali, Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC , EW10, pp.10-15, 2002.
DOI : 10.1145/1133373.1133375

J. Wegener, H. Sthamer, D. Jones, and . Eyres, Testing real-time systems using genetic algorithms, Software Quality Journal, vol.21, issue.2, pp.259-288, 1997.

[. Waters, G. Waters, D. Ball, and I. Dudgeon, Australia and cyberwarfare, 2008.

J. Xu, . Lukkien, . Pdv-van-der-stok, P. Ir, . Verhoeven et al., Performance benchmarking of freertos and its hardware abstraction, 2008.

S. Xi, J. Wilson, C. Lu, and C. Gill, RT-Xen, Proceedings of the ninth ACM international conference on Embedded software, EMSOFT '11, pp.39-48, 2011.
DOI : 10.1145/2038642.2038651

J. Yan and W. Zhang, WCET Analysis for Multi-Core Processors with Shared L2 Instruction Caches, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium, pp.80-89, 2008.
DOI : 10.1109/RTAS.2008.6

J. Zamorano and J. Puente, On real-time partitioned multicore systems, ACM SIGAda Ada Letters, vol.33, issue.2, pp.33-39
DOI : 10.1145/2552999.2553003

[. Zimmer, VMware Server & VMware Player, 2006.