Sciweavers

3516 search results - page 223 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
129
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 28 days ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
ASPDAC
2010
ACM
233views Hardware» more  ASPDAC 2010»
15 years 1 months ago
Computer-aided recoding for multi-core systems
- The design of embedded computing systems faces a serious productivity gap due to the increasing complexity of their hardware and software components. One solution to address this...
Rainer Dömer
146
Voted
ICONS
2008
IEEE
15 years 10 months ago
Analysis of Hybrid Systems Using HySAT
In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a ...
Christian Herde, Andreas Eggers, Martin Fränz...
127
Voted
CONEXT
2008
ACM
15 years 5 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
122
Voted
CODES
2003
IEEE
15 years 9 months ago
Synthesis of real-time embedded software with local and global deadlines
Current methods cannot synthesize real-time embedded software applications when the global deadline of a task is shorter than the total of all local deadlines along a critical pat...
Pao-Ann Hsiung, Cheng-Yi Lin