Sciweavers

1432 search results - page 80 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
CGO
2006
IEEE
15 years 9 months ago
A Cross-Architectural Interface for Code Cache Manipulation
Software code caches help amortize the overhead of dynamic binary transformation by enabling reuse of transformed code. Since code caches contain a potentiallyaltered copy of ever...
Kim M. Hazelwood, Robert S. Cohn
CODES
1999
IEEE
15 years 7 months ago
Scheduling with optimized communication for time-triggered embedded systems
We present an approach to process scheduling for synthesis of safety-critical distributed embedded systems. Our system model captures both the flow of data and that of control. Th...
Paul Pop, Petru Eles, Zebo Peng
AOSE
2005
Springer
15 years 9 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
136
Voted
HICSS
2009
IEEE
161views Biometrics» more  HICSS 2009»
15 years 7 months ago
Configurative Service Engineering - A Rule-Based Configuration Approach for Versatile Service Processes in Corrective Maintenanc
Recently, service orientation has increasingly been debated both in research and practice. While researchers postulate a paradigm shift towards services as the basic unit of excha...
Jörg Becker, Daniel Beverungen, Ralf Knackste...
140
Voted
ACSC
2007
IEEE
15 years 7 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...