Sciweavers

3516 search results - page 393 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
RTAS
2003
IEEE
15 years 10 months ago
Feedback Control Real-Time Scheduling in ORB Middleware
Existing real-time ORB middleware standards such as RT-CORBA do not adequately address the challenges of 1) providing robust performance guarantees portably across different platf...
Chenyang Lu, Xiaorui Wang, Christopher D. Gill
FDL
2004
IEEE
15 years 8 months ago
A Formal Verification Approach for IP-based Designs
This paper proposes a formal verification methodology which is smoothly integrated with component-based system-level design, using a divide and conquer approach. The methodology a...
Daniel Karlsson, Petru Eles, Zebo Peng
ECBS
2005
IEEE
58views Hardware» more  ECBS 2005»
15 years 10 months ago
MoDeII: Modeling and Analyzing Time-Constraints
The fulfillment of time requirements is one of the major acceptance criteria of safety-critical and real-time systems. They are dictated by the environment of these systems and a...
Jewgenij Botaschanjan, Jan Jürjens
CEFP
2005
Springer
15 years 10 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 10 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory