Sciweavers

3516 search results - page 508 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
AOSE
2001
Springer
15 years 9 months ago
Modeling Early Requirements in Tropos: A Transformation Based Approach
We are developing an agent-oriented software development methodology, called Tropos, which integrates ideas from multi-agentsystem technologies and RequirementsEngineering researc...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
ISMVL
2007
IEEE
104views Hardware» more  ISMVL 2007»
15 years 10 months ago
Evaluation of Toggle Coverage for MVL Circuits Specified in the SystemVerilog HDL
Designing modern circuits comprised of millions of gates is a very challenging task. Therefore new directions are investigated for efficient modeling and verification of such syst...
Mahsan Amoui, Daniel Große, Mitchell A. Thor...
ICSE
2009
IEEE-ACM
16 years 5 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
SIGCOMM
2012
ACM
13 years 6 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
EMSOFT
2009
Springer
15 years 11 months ago
Clock-driven distributed real-time implementation of endochronous synchronous programs
An important step in model-based embedded system design consists in mapping functional specifications and their tasks/operations onto execution architectures and their ressources...
Dumitru Potop-Butucaru, Robert de Simone, Yves Sor...