Sciweavers

1178 search results - page 110 / 236
» A Methodological Approach to Developing Model Transformation...
Sort
View
WSC
2007
15 years 4 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
DAC
2004
ACM
16 years 2 months ago
A novel approach for flexible and consistent ADL-driven ASIP design
Architecture description languages (ADL) have been established to aid the design of application-specific instruction-set processors (ASIP). Their main contribution is the automati...
Achim Nohl, Gunnar Braun, Hanno Scharwächter,...
FIDJI
2004
Springer
15 years 7 months ago
An MDA-Based Approach for Inferring Concurrency in Distributed Systems
Abstract. When dealing with distributed systems, one of the most important problems that has to be addressed is concurrency. Distributed systems are inherently concurrent, distribu...
Raul Silaghi, Alfred Strohmeier
JCSS
2006
56views more  JCSS 2006»
15 years 1 months ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
15 years 5 months ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...