Sciweavers

3516 search results - page 192 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
111
Voted
SOSYM
2008
87views more  SOSYM 2008»
15 years 3 months ago
Model driven design and aspect weaving
Amodelisasimplifiedrepresentationofanaspect of the world for a specific purpose. In complex systems, many aspects are to be handled, from architectural aspects to dynamic behavior,...
Jean-Marc Jézéquel
141
Voted
RTSS
2007
IEEE
15 years 9 months ago
An Energy-Driven Design Methodology for Distributing DSP Applications across Wireless Sensor Networks
Wireless sensor network (WSN) applications have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that have small size and...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
134
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 10 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
CODES
2006
IEEE
15 years 9 months ago
Generic netlist representation for system and PE level design exploration
Designer productivity and design predictability are vital factors for successful embedded system design. Shrinking time-to-market and increasing complexity of these systems requir...
Bita Gorjiara, Mehrdad Reshadi, Pramod Chandraiah,...
114
Voted
SPIN
2010
Springer
15 years 1 months ago
Automatic Generation of Model Checking Scripts Based on Environment Modeling
When applying model checking to the design models of the embedded systems, it is necessary to model not only the behavior of the target system but also that of the environment inte...
Kenro Yatake, Toshiaki Aoki