Sciweavers

ECBS
2002
IEEE
81views Hardware» more  ECBS 2002»
13 years 8 months ago
Optimization of a Retargetable Functional Simulator for Embedded Processors
The objective of this research is to develop tools and methods for system-level optimization of embedded software that is executed on system-on-chip platforms. In particular, this...
Francesco Papariello, Gabriele Luculli
ECBS
2002
IEEE
119views Hardware» more  ECBS 2002»
13 years 8 months ago
Managing Complex Temporal Requirements in Real-Time Control Systems
Design and implementation of motion control applications includes the transition from control design to real-time system implementation. To make this transition smooth, the specif...
Kristian Sandström, Christer Norström
ECBS
2002
IEEE
118views Hardware» more  ECBS 2002»
13 years 8 months ago
On the Relation between Design Contracts and Errors: A Software Development Strategy
When designing a software module or system, a systems engineer must consider and differentiate between how the system responds to external and internal errors. External errors can...
Eivind J. Nordby, Martin Blom, Anna Brunstrom
ECBS
2002
IEEE
87views Hardware» more  ECBS 2002»
13 years 8 months ago
Requirements Engineering for Time-to-Market Projects
This paper identifies the essential components of a Requirements Engineering (RE) process and provides alternatives to the Requirements Analyst (RA) when deciding on a particular ...
Christopher McPhee, Armin Eberlein
ECBS
2002
IEEE
82views Hardware» more  ECBS 2002»
13 years 8 months ago
Mobile Agent Interoperability Patterns and Practice
A major setback for mobile agent technology is a lack of interoperability between systems for mobile agents which prevents them from reaching “critical mass”. In this paper, w...
Ulrich Pinsdorf, Volker Roth
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
13 years 8 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
ECBS
2002
IEEE
115views Hardware» more  ECBS 2002»
13 years 8 months ago
An Extensible Software Architecture for Mobile Components
This paper presents a generic software architecture for large-scale distributed applications in which mobile agents are an integral part. We developed this architecture through th...
Dag Johansen, Kåre J. Lauvset, Keith Marzull...
ECBS
2002
IEEE
120views Hardware» more  ECBS 2002»
13 years 8 months ago
FRAME for Achieving Performance Portability within Heterogeneous Environments
Resource heterogeneity offers a new challenge to portability of resource critical applications such as multimedia or interactive applications. Under heterogeneous environments, a ...
Ren-Song Ko, Matt W. Mutka
ECBS
2002
IEEE
146views Hardware» more  ECBS 2002»
13 years 8 months ago
Top-Down Composition of Software Architectures
This paper discusses an approach for top-down composition of software architectures. First, an architecture is derived that addresses functional requirements only. This architectu...
Hans de Bruin, Hans van Vliet