Sciweavers

3516 search results - page 558 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
Event classification for personal photo collections
People take more and more photos at different time and different events, however, these photos are often put into one giant folder and they are seldom annotated or organized. As t...
Feng Tang, Daniel Tretter, Chris Willis
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
15 years 2 months ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
GCC
2009
Springer
15 years 1 months ago
On HLA-Based Collaborative Simulation Techniques
The design and development of a complex system as well as the simulation of its dynamic behavior are usually involved in multidisciplinary field knowledge. HLA-based collaborative ...
Fan Miao Miao, Fan Yu Shun
137
Voted
CSMR
1999
IEEE
15 years 8 months ago
Employing Use-cases and Domain Knowledge for Comprehending Resource Usage
Philips Electronics is a world wide electronics company that develops many products containing embedded software. These products range from shavers with only few hundred bytes of ...
René L. Krikhaar, Maarten Pennings, J. Zonn...
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 9 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold