Sciweavers

3516 search results - page 317 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
148
Voted
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
15 years 8 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu
ICSE
2003
IEEE-ACM
16 years 4 months ago
Moving from Quality Attribute Requirements to Architectural Decisions
Quality attribute models are proposed as the linkage between a specification of a quality attribute requirement and a design fragment that is focused on achieving that requirement...
Felix Bachmann, Len Bass, Mark Klein
ENTCS
2008
83views more  ENTCS 2008»
15 years 4 months ago
Executable Specifications for Real-Time Distributed Systems
One of the challenges in designing distributed, embedded systems is the paucity of formal, executable specification notations that provide support for both real-time and asynchron...
Arnab Ray, Rance Cleaveland
CADUI
2004
15 years 5 months ago
MAUI: An Interface Design Tool Based on Matrix Algebra
Abstract We describe MAUI, a user interface design tool that is based on a matrix algebra model of interaction. MAUI can be used to build and analyse designs for interactive system...
Jeremy Gow, Harold W. Thimbleby