Sciweavers

2141 search results - page 286 / 429
» Embedded Software
Sort
View
IWSSD
2000
IEEE
15 years 6 months ago
Design Guidance through the Controlled Application of Constraints
We seek to facilitate development of high quality software designs and architectures by using rigorous process definitions to guide application of the complex structure of relati...
Aaron G. Cass, Leon J. Osterweil
PLPV
2010
ACM
15 years 4 months ago
Challenge benchmarks for verification of real-time programs
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for the program verification community as software errors can have catastrophic conse...
Tomás Kalibera, Pavel Parizek, Ghaith Hadda...
LCTRTS
2010
Springer
15 years 9 months ago
Sampling-based program execution monitoring
For its high overall cost during product development, program debugging is an important aspect of system development. Debugging is a hard and complex activity, especially in time-...
Sebastian Fischmeister, Yanmeng Ba
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 9 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
142
Voted
JTRES
2009
ACM
15 years 9 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....