Sciweavers

1446 search results - page 137 / 290
» Hardware Software Co-Design Using Functional Languages
Sort
View
184
Voted
JHSN
2006
267views more  JHSN 2006»
15 years 5 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
BSN
2009
IEEE
160views Sensor Networks» more  BSN 2009»
15 years 12 months ago
BSN Simulator: Optimizing Application Using System Level Simulation
—A biomonitoring application running on wireless BAN has stringent timing and energy requirements. Developing such applications therefore presents unique challenges in both hardw...
Ioana Cutcutache, Thi Thanh Nga Dang, Wai Kay Leon...
ECLIPSE
2006
ACM
15 years 11 months ago
XPlainer-Eclipse: explaining XPath within Eclipse
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specificatio...
John W. S. Liu, Mariano P. Consens, Flavio Rizzolo
152
Voted
APSEC
1999
IEEE
15 years 9 months ago
The Quest for Correct Systems: Model Checking of Diagrams and Datatypes
For the practical development of provably correct software for embedded systems the close integration of CASE tools and verification tools is required. This paper describes the co...
Jan Philipps, Oscar Slotosch
SIGSOFT
2000
ACM
15 years 9 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip