Sciweavers

3516 search results - page 295 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ESOP
2008
Springer
15 years 5 months ago
A Hybrid Denotational Semantics for Hybrid Systems
Abstract. In this article, we present a model and a denotational semantics for hybrid systems. Our model is designed to be used for the verification of large, existing embedded app...
Olivier Bouissou, Matthieu Martel
PVLDB
2010
168views more  PVLDB 2010»
15 years 2 months ago
Active Complex Event Processing: Applications in Real-Time Health Care
Our analysis of many real-world event based applications has revealed that existing Complex Event Processing technology (CEP), while effective for efficient pattern matching on e...
Di Wang, Elke A. Rundensteiner, Richard Ellison, H...
ASYNC
2005
IEEE
112views Hardware» more  ASYNC 2005»
15 years 9 months ago
Request-Driven GALS Technique for Wireless Communication System
A Globally Asynchronous - Locally Synchronous (GALS) technique for application in wireless communication systems is proposed and evaluated. The GALS wrappers are based on a reques...
Milos Krstic, Eckhard Grass, Christian Stahl
TII
2011
206views Education» more  TII 2011»
14 years 11 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
APLAS
2010
ACM
15 years 4 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...