Sciweavers

1024 search results - page 81 / 205
» High-Level Execution Time Analysis
Sort
View
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
15 years 6 months ago
Worst case delay analysis for memory interference in multicore systems
Abstract—Employing COTS components in real-time embedded systems leads to timing challenges. When multiple CPU cores and DMA peripherals run simultaneously, contention for access...
Rodolfo Pellizzoni, Andreas Schranzhofer, Jian-Jia...
FAC
2010
148views more  FAC 2010»
14 years 11 months ago
Automating the transformation-based analysis of visual languages
We present a novel approach for the automatic generation of model-to-model transformations given a description of the operational semantics of the source language in the form of gr...
Juan de Lara, Hans Vangheluwe
PSTV
1992
113views Hardware» more  PSTV 1992»
15 years 2 months ago
Coverage Preserving Reduction Strategies for Reachability Analysis
We study the effect of three new reduction strategies for conventional reachability analysis, as used in automated protocol validation algorithms. The first two strategies are imp...
Gerard J. Holzmann, Patrice Godefroid, Didier Piro...
ACRI
2006
Springer
15 years 7 months ago
Improved Cell-DEVS Models for Fire Spreading Analysis
The spread of fire is a complex phenomenon that many have tried to study over the years. As one can imagine, the spread of fire depends on many different variables such as the mate...
Matthew MacLeod, Rachid Chreyh, Gabriel A. Wainer
ISSTA
2009
ACM
15 years 7 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis