Sciweavers

3119 search results - page 209 / 624
» Abstract Requirement Analysis in Multiagent System Design
Sort
View
146
Voted
ICCS
2009
Springer
15 years 10 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
100
Voted
CAV
2007
Springer
129views Hardware» more  CAV 2007»
15 years 10 months ago
BAT: The Bit-Level Analysis Tool
Abstract. While effective methods for bit-level verification of low-level properties exist, system-level properties that entail reasoning about a significant part of the design p...
Panagiotis Manolios, Sudarshan K. Srinivasan, Daro...
95
Voted
ICRA
2007
IEEE
127views Robotics» more  ICRA 2007»
15 years 10 months ago
A Comparative Dependability Analysis of Antagonistic Actuation Arrangements for Enhanced Robotic Safety
Abstract— In this paper we introduce an analysis of dependability of an elementary yet critical component of robotic systems designed to operate in environments shared with human...
Roberto Filippini, Soumen Sen, Giovanni Tonietti, ...
151
Voted
RE
2010
Springer
14 years 10 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson
118
Voted
DSD
2009
IEEE
144views Hardware» more  DSD 2009»
15 years 10 months ago
Composable Resource Sharing Based on Latency-Rate Servers
Abstract—Verification of application requirements is becoming a bottleneck in system-on-chip design, as the number of applications grows. Traditionally, the verification comple...
Benny Akesson, Andreas Hansson, Kees Goossens