Sciweavers

2210 search results - page 156 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
114
Voted
DAC
2009
ACM
15 years 9 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
ISCAS
2002
IEEE
111views Hardware» more  ISCAS 2002»
15 years 7 months ago
CASCADE - configurable and scalable DSP environment
As the complexity of embedded systems grows rapidly, it is common to accelerate critical tasks with hardware. Designers usually use off-the-shelf components or licensed IP cores t...
Tay-Jyi Lin, Chein-Wei Jen
132
Voted
WORDS
2003
IEEE
15 years 7 months ago
Using Co-ordinated Atomic Actions for Building Complex Web Applications: A Learning Experience
This paper discusses some of the typical characteristics of modern Web applications and analyses some of the problems the developers of such systems have to face. One of such type...
Avelino F. Zorzo, Panayiotis Periorellis, Alexande...
105
Voted
IC3
2009
15 years 9 days ago
A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching
A number of algorithms and approaches have been proposed towards the problem of scanning and digitizing research papers. We can classify work done in the past into three major appr...
Deepank Gupta, Bob Morris, Terry Catapano, Guido S...
ICRE
1998
IEEE
15 years 6 months ago
Viewpoints for Requirements Elicitation: A Practical Approach
This paper introduces an approach to multi-perspective requirements engineering (PREview) which has been designed for industrial use and discusses our practical experience in appl...
Ian Sommerville, Peter Sawyer, Stephen Viller