Sciweavers

4647 search results - page 170 / 930
» Analysis and design of OFDM-IDMA systems
Sort
View
DATE
2009
IEEE
143views Hardware» more  DATE 2009»
15 years 5 months ago
Dimensioning heterogeneous MPSoCs via parallelism analysis
—In embedded computing we face a continuously growing algorithm complexity combined with a constantly rising number of applications running on a single system. Multi-core systems...
Bastian Ristau, Torsten Limberg, Oliver Arnold, Ge...
72
Voted
UM
2007
Springer
15 years 4 months ago
Exploiting Evidence Analysis in Plan Recognition
Information graphics, such as bar charts and line graphs, that appear in popular media generally have a message that they are intended to convey. We have developed a novel plan inf...
Sandra Carberry, Stephanie Elzer
82
Voted
FORTE
2004
14 years 11 months ago
Model-Checking Plus Testing: From Software Architecture Analysis to Code Testing
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ENTCS
2008
106views more  ENTCS 2008»
14 years 10 months ago
Towards Verifying Model Transformations
In model-based software development, a complete design and analysis process involves designing the system using the design language, converting it into the analysis language, and ...
Anantha Narayanan, Gabor Karsai