Sciweavers

1163 search results - page 207 / 233
» Case Studies of Model Checking for Embedded System Designs
Sort
View
101
Voted
HF
2002
95views more  HF 2002»
15 years 1 months ago
Formal Verification of Human-Automation Interaction
This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machi...
Asaf Degani, Michael Heymann
111
Voted
SAFECOMP
2007
Springer
15 years 8 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
MSWIM
2004
ACM
15 years 7 months ago
On utility-based radio resource management with and without service guarantees
In this paper we discuss utility functions models to study Radio Resource Management. Our goal is to identify the characteristics of the wireless systems which make such theoretic...
Leonardo Badia, Michele Zorzi
WWIC
2005
Springer
197views Communications» more  WWIC 2005»
15 years 7 months ago
Reducing Memory Fragmentation with Performance-Optimized Dynamic Memory Allocators in Network Applications
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...
147
Voted
SOUPS
2006
ACM
15 years 7 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson