Sciweavers

107 search results - page 2 / 22
» Dependable Polygon-Processing Algorithms for Safety-Critical...
Sort
View
DATE
2000
IEEE
117views Hardware» more  DATE 2000»
13 years 9 months ago
Evaluating System Dependability in a Co-Design Framework
The widespread adoption of embedded microprocessor-based systems for safety critical applications mandates the use of co-design tools able to evaluate system dependability at ever...
Marcello Lajolo, Maurizio Rebaudengo, Matteo Sonza...
ECRTS
2009
IEEE
13 years 2 months ago
Using Randomized Caches in Probabilistic Real-Time Systems
While hardware caches are generally effective at improving application performance, they greatly complicate performance prediction. Slight changes in memory layout or data access p...
Eduardo Quiñones, Emery D. Berger, Guillem ...
PRDC
2008
IEEE
13 years 11 months ago
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems
Correctly specifying requirements for composite systems is essential to system safety, particularly in a distributed development environment. Goal-oriented requirements engineerin...
Jennifer Black, Philip Koopman
ISCAS
2007
IEEE
129views Hardware» more  ISCAS 2007»
13 years 11 months ago
Modeling of self-adaptive systems with SCADE
— An important property of embedded systems is dependability. Today this addresses mostly safety and reliability. Guaranteeing these properties is normally done by adding redunda...
Matthias Güdemann, Andreas Angerer, Frank Ort...
RTCSA
2000
IEEE
13 years 9 months ago
Extracting safe and precise control flow from binaries
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
Henrik Theiling