Sciweavers

327 search results - page 20 / 66
» Early Safety Analysis: from Use Cases to Component-based Sof...
Sort
View
MASCOTS
2004
14 years 11 months ago
Performance Engineering with the UML Profile for Schedulability, Performance and Time: A Case Study
We describe the application of a performance engineering methodology based on UML diagrams with annotations taken from the Profile for Schedulability, Performance and Time. The me...
Andrew J. Bennett, A. J. Field
ESSOS
2011
Springer
14 years 1 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
IJCV
2007
363views more  IJCV 2007»
14 years 9 months ago
Image Analysis and Reconstruction using a Wavelet Transform Constructed from a Reducible Representation of the Euclidean Motion
Abstract. Inspired by the early visual system of many mammalians we consider the construction of-and reconstruction from- an orientation score Uf : R2 ×S1 → C as a local orienta...
Remco Duits, Michael Felsberg, Gösta H. Granl...
ISSS
1996
IEEE
169views Hardware» more  ISSS 1996»
15 years 1 months ago
The Use of a Virtual Instruction Set for the Software Synthesis of HW/SW Embedded Systems
The application range of the embedded computing is going to cover the majority of the market products spanning from consumer electronic, automotive, telecom and process control. F...
Alessandro Balboni, William Fornaciari, M. Vincenz...
SIGSOFT
2004
ACM
15 years 10 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek