Sciweavers

1054 search results - page 26 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
BIRTHDAY
2008
Springer
15 years 3 months ago
Approximating Behaviors in Embedded System Design
Embedded systems are electronic devices that function in the context of a physical environment, by sensing and reacting to a set of stimuli. To simplify the design of embedded syst...
Roberto Passerone, Alberto L. Sangiovanni-Vincente...
ICSM
2005
IEEE
15 years 7 months ago
Towards a Framework for Testing Structural Source-Code Regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens
ICMCS
2007
IEEE
153views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Towards Adversary Aware Surveillance Systems
We consider surveillance problems to be a set of system- adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his ...
Vivek K. Singh, Mohan S. Kankanhalli
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 3 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
WORDS
2005
IEEE
15 years 7 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...