Sciweavers

9018 search results - page 339 / 1804
» 3D-Brain Model Software
Sort
View
172
Voted
SERP
2010
15 years 3 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
138
Voted
WCET
2010
15 years 2 months ago
Realism in Statistical Analysis of Worst Case Execution Times
This paper considers the use of Extreme Value Theory (EVT) to model worst-case execution times. In particular it considers the sacrifice that statistical methods make in the reali...
David Griffin, Alan Burns
116
Voted
DATE
2002
IEEE
137views Hardware» more  DATE 2002»
15 years 10 months ago
The Modelling of Embedded Systems Using HASoC
We present a design method (HASoC) for the lifecycle modelling of embedded systems that are targeted primarily, but not necessarily, at SoC implementations. The object-oriented de...
M. D. Edwards, P. N. Green
EKNOW
2009
15 years 2 months ago
Visual Middle-Out Modeling of Problem Spaces
Modeling is a complex and central activity in many domains. Domain experts and designers usually work by drawing and create models from the middle-out; however, visual and middle-...
Andrea Valente
IESS
2009
Springer
182views Hardware» more  IESS 2009»
15 years 2 months ago
Modeling Cache Effects at the Transaction Level
Abstract. Embedded system design complexities are growing exponentially. Demand has increased for modeling techniques that can provide both accurate measurements of delay and fast ...
Ardavan Pedram, David Craven, Andreas Gerstlauer