Sciweavers

757 search results - page 8 / 152
» Composing Security-Aware Software
Sort
View
WCET
2008
14 years 11 months ago
On Composable System Timing, Task Timing, and WCET Analysis
The complexity of hardware and software architectures used in today's embedded systems make a hierarchical, composable timing analysis impossible. This paper describes the so...
Peter P. Puschner, Martin Schoeberl
EUROMICRO
2006
IEEE
15 years 4 months ago
Composing Components in Design Phase using Exogenous Connectors
Composition can take place during different stages of component life cycle. We identify two main stages : design phase - components are composed into composite components for reus...
Kung-Kiu Lau, Ling Ling, Zheng Wang
ACMACE
2009
ACM
15 years 1 months ago
Music box: composing and performing visual music
Music Box is an artistic implementation of emergent behavior and its use to create music. Music Box employs Craig Reynold's flocking algorithm to display animated notes that ...
Lindsay Grace
APSEC
2007
IEEE
15 years 4 months ago
Coordination-Policy Based Composed System Behavior Derivation
The coordination-policy that components interactions satisfied often determines the properties of nowadays component-based information systems, e.g. Safety, Liveness and Fairness ...
Yiming Lau, Wenyun Zhao, Xin Peng, Zhixiong Jiang,...
FIW
2007
123views Communications» more  FIW 2007»
14 years 11 months ago
Composing Features by Managing Inconsistent Requirements
Abstract. One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferri...
Robin C. Laney, Thein Than Tun, Michael Jackson, B...