Sciweavers

694 search results - page 91 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
143
Voted
ISSRE
2003
IEEE
15 years 8 months ago
Assessing Uncertainty in Reliability of Component-Based Software Systems
Many architecture–based software reliability models were proposed in the past. Regardless of the accuracy of these models, if a considerable uncertainty exists in the estimates ...
Katerina Goseva-Popstojanova, Sunil Kamavaram
142
Voted
DAC
2006
ACM
16 years 4 months ago
Early cutpoint insertion for high-level software vs. RTL formal combinational equivalence verification
Ever-growing complexity is forcing design to move above RTL. For example, golden functional models are being written as clearly as possible in software and not optimized or intend...
Xiushan Feng, Alan J. Hu
EUROMICRO
2002
IEEE
15 years 8 months ago
Towards an Impact Analysis for Component Based Real-Time Product Line Architectures
In this paper we propose a method for predicting the consequences of adding new components to an existing product line in the real-time systems domain. We refer to such a predicti...
Anders Wall, Magnus Larsson, Christer Norströ...
131
Voted
CODES
2007
IEEE
15 years 9 months ago
A low power VLIW processor generation method by means of extracting non-redundant activation conditions
This paper proposes a low power VLIW processor generation method by automatically extracting non-redundant activation conditions of pipeline registers for clock gating. It is impo...
Hirofumi Iwato, Keishi Sakanushi, Yoshinori Takeuc...
115
Voted
CISIS
2010
IEEE
15 years 10 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...