Sciweavers

878 search results - page 140 / 176
» A systematic approach to software peripherals for embedded s...
Sort
View
JTRES
2009
ACM
15 years 6 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 6 months ago
Reconciling Manual and Automated Testing: The AutoTest Experience
Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a large number of tests in little time, whereas manual...
Andreas Leitner, Ilinca Ciupa, Bertrand Meyer, Mar...
TSI
2008
129views more  TSI 2008»
14 years 11 months ago
COSMOS, composition de noeuds de contexte
Ubiquitous applications are facing a large diversity of execution contexts. However, this diversity requires some continual adaptation to preserve the correct execution of these ap...
Denis Conan, Romain Rouvoy, Lionel Seinturier
CASES
2008
ACM
15 years 1 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
APAQS
2001
IEEE
15 years 3 months ago
End-to-End Integration Testing
Integration testing has always been a challenge especially if the system under test is large with many subsystems and interfaces. This paper proposes an approach to design End-toE...
Raymond A. Paul