Sciweavers

ISOLA
2010
Springer
13 years 2 months ago
Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns
Abstract. This article deals with performance verifications of architecture models of real-time embedded systems. We focus on models verified with the real-time scheduling theory...
Alain Plantec, Frank Singhoff, Pierre Dissaux, J&e...
WICSA
2004
13 years 5 months ago
Establishing a Software Architecting Environment
We present the work of establishing an integrated environment that facilitates architecture design, reconstruction, and maintenance in the entire life cycle of a software product ...
Claudio Riva, Petri Selonen, Tarja Systä, Ant...
FASE
2008
Springer
13 years 6 months ago
Formal Approach to Integrating Feature and Architecture Models
If we model a family of software applications with a feature model and an architecture model, we are describing the same subject from different perspectives. Hence, we are running ...
Mikolás Janota, Goetz Botterweck
PATMOS
2000
Springer
13 years 8 months ago
Data-Reuse and Parallel Embedded Architectures for Low-Power, Real-Time Multimedia Applications
Exploitation of data re-use in combination with the use of custom memory hierarchy that exploits the temporal locality of data accesses may introduce significant power savings, esp...
Dimitrios Soudris, Nikolaos D. Zervas, Antonios Ar...
SEKE
2009
Springer
13 years 8 months ago
Collaborative Development of System Architecture - a Tool for Coping with Inconsistency
Very large systems have an architecture that is designed to allow them to evolve through a long life. Such systems are developed by teams of architects. One of the first things t...
Peter Henderson, Matthew J. Henderson
DATE
2003
IEEE
91views Hardware» more  DATE 2003»
13 years 9 months ago
Fast and Accurate Multiprocessor Architecture Exploration with Symbolic Programs
In system-level platform-based embedded systems design, the mapping model is a crucial link between the application model and the architecture model. All three models must match w...
Vladimir D. Zivkovic, Erwin A. de Kock, Pieter van...
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
13 years 10 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
ECBS
2005
IEEE
162views Hardware» more  ECBS 2005»
13 years 10 months ago
Architecture Rationalization: A Methodology for Architecture Verifiability, Traceability and Completeness
Architecture modeling is practiced extensively in the software industry but there is little attention paid to the traceability, verifiability and completeness of architecture desi...
Antony Tang, Jun Han
DAC
2003
ACM
14 years 5 months ago
An IDF-based trace transformation method for communication refinement
In the Artemis project [13], design space exploration of embedded systems is provided by modeling application behavior and architectural performance constraints separately. Mappin...
Andy D. Pimentel, Cagkan Erbas