Sciweavers

3516 search results - page 507 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
126
Voted
ICCAD
2001
IEEE
108views Hardware» more  ICCAD 2001»
16 years 1 months ago
Placement Driven Retiming with a Coupled Edge Timing Model
Retiming is a widely investigated technique for performance optimization. It performs powerful modifications on a circuit netlist. However, often it is not clear, whether the pred...
Ingmar Neumann, Wolfgang Kunz
TACAS
2010
Springer
181views Algorithms» more  TACAS 2010»
15 years 11 months ago
Boom: Taking Boolean Program Model Checking One Step Further
Abstract. We present Boom, a comprehensive analysis tool for Boolean programs. We focus in this paper on model-checking non-recursive concurrent programs. Boom implements a recent ...
Gérard Basler, Matthew Hague, Daniel Kroeni...
MOBIWAC
2006
ACM
15 years 10 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...
ADVIS
2006
Springer
15 years 10 months ago
Validation of XML Documents: From UML Models to XML Schemas and XSLT Stylesheets
The widespread use of XML brings out the need of ensuring the validity of XML data. The use of languages such as XML Schema makes easier the process of verification of XML documen...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
CAISE
2009
Springer
15 years 11 months ago
A Method for Service Identification from Business Process Models in a SOA Approach
Abstract. Various approaches for services development in SOA propose business processes as a starting point. However, there is a lack of systematic methods for services identificat...
Leonardo Guerreiro Azevedo, Flávia Maria Sa...