Sciweavers

3516 search results - page 225 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
USS
2008
15 years 6 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
123
Voted
AI
2002
Springer
15 years 3 months ago
Modeling Organizational Rules in the Multi-agent Systems Engineering Methodology
Recently, two advances in agent-oriented software engineering have had a significant impact: the identification of interaction and coordination as the central focus of multi-agent ...
Scott A. DeLoach
CASES
2006
ACM
15 years 9 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
137
Voted
DATE
1999
IEEE
162views Hardware» more  DATE 1999»
15 years 8 months ago
MOCSYN: Multiobjective Core-Based Single-Chip System Synthesis
In this paper, we present a system synthesis algorithm, called MOCSYN, which partitions and schedules embedded system specifications to intellectual property cores in an integrate...
Robert P. Dick, Niraj K. Jha
141
Voted
DAC
1999
ACM
16 years 4 months ago
Synthesis of Embedded Software Using Free-Choice Petri Nets
Software synthesis from a concurrent functional specification is a key problem in the design of embedded systems. A concurrent specification is well-suited for medium-grained part...
Marco Sgroi, Luciano Lavagno