Sciweavers

3516 search results - page 615 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
182
Voted
FPGA
2003
ACM
161views FPGA» more  FPGA 2003»
15 years 9 months ago
Implementation of BEE: a real-time large-scale hardware emulation engine
This paper describes the hardware implementation of a real-time, large-scale, multi-chip FPGA (Field Programmable Gate Array) based emulation engine with a capacity of 10 million ...
Chen Chang, Kimmo Kuusilinna, Brian C. Richards, R...
152
Voted
UML
2000
Springer
15 years 7 months ago
On the Extension of UML with Use Case Maps Concepts
Descriptions of reactive systems focus heavily on behavioral aspects, often in terms of scenarios. To cope with the increasing complexity of services provided by these systems, beh...
Daniel Amyot, Gunter Mussbacher
140
Voted
ESSMAC
2003
Springer
15 years 9 months ago
Joint Optimization of Wireless Communication and Networked Control Systems
Abstract. We consider a linear system, such as an estimator or a controller, in which several signals are transmitted over wireless communication channels. With the coding and medi...
Lin Xiao, Mikael Johansson, Haitham A. Hindi, Step...
ISCC
2008
IEEE
123views Communications» more  ISCC 2008»
15 years 10 months ago
Improving reliability and energy efficiency of disk systems via utilization control
As disk drives become increasingly sophisticated and processing power increases, one of the most critical issues of designing modern disk systems is data reliability. Although num...
Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xi...
131
Voted
ESOP
2010
Springer
16 years 1 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker