Sciweavers

225 search results - page 38 / 45
» Design for Constraint Violation Detection in Safety-Critical...
Sort
View
ICPPW
2006
IEEE
15 years 5 months ago
Model Checking Control Communication of a FACTS Device
This paper concerns the design and verification of a realtime communication protocol for sensor data collection and processing between an embedded computer and a DSP. In such sys...
David A. Cape, Bruce M. McMillin, James K. Townsen...
IASSE
2004
15 years 1 months ago
Execution of A Requirement Model in Software Development
Latest research results have shown that requirements errors have a prolonged impact on software development and that they are more expensive to fix during later stages than early ...
Wuwei Shen, Mohsen Guizani, Zijiang Yang, Kevin J....
SENSYS
2005
ACM
15 years 5 months ago
Sympathy for the sensor network debugger
Being embedded in the physical world, sensor networks present a wide range of bugs and misbehavior qualitatively different from those in most distributed systems. Unfortunately, d...
Nithya Ramanathan, Kevin K. Chang, Rahul Kapur, Le...
ICARCV
2006
IEEE
313views Robotics» more  ICARCV 2006»
15 years 5 months ago
GestureCam: A Smart Camera for Gesture Recognition and Gesture-Controlled Web Navigation
– Smart camera, or an intelligent camera, is an embedded vision system which captures and processes image to extract application-specific information in real time. Smart cameras ...
Yu Shi, Ronnie Taib, Serge Lichman
AOSD
2010
ACM
15 years 6 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen