Sciweavers

694 search results - page 91 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
ISSRE
2003
IEEE
15 years 5 months ago
Assessing Uncertainty in Reliability of Component-Based Software Systems
Many architecture–based software reliability models were proposed in the past. Regardless of the accuracy of these models, if a considerable uncertainty exists in the estimates ...
Katerina Goseva-Popstojanova, Sunil Kamavaram
DAC
2006
ACM
16 years 23 days ago
Early cutpoint insertion for high-level software vs. RTL formal combinational equivalence verification
Ever-growing complexity is forcing design to move above RTL. For example, golden functional models are being written as clearly as possible in software and not optimized or intend...
Xiushan Feng, Alan J. Hu
EUROMICRO
2002
IEEE
15 years 4 months ago
Towards an Impact Analysis for Component Based Real-Time Product Line Architectures
In this paper we propose a method for predicting the consequences of adding new components to an existing product line in the real-time systems domain. We refer to such a predicti...
Anders Wall, Magnus Larsson, Christer Norströ...
CODES
2007
IEEE
15 years 6 months ago
A low power VLIW processor generation method by means of extracting non-redundant activation conditions
This paper proposes a low power VLIW processor generation method by automatically extracting non-redundant activation conditions of pipeline registers for clock gating. It is impo...
Hirofumi Iwato, Keishi Sakanushi, Yoshinori Takeuc...
CISIS
2010
IEEE
15 years 6 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...