Sciweavers

1665 search results - page 141 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
RTCSA
2008
IEEE
15 years 4 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
RSP
2003
IEEE
15 years 3 months ago
Verification of Timing Properties in Rapid System Prototyping
This paper addresses the need for systematic verification of timing properties of real-time prototypes, which consist of timing constraints that must be satisfied at any given tim...
Doron Drusinsky, Man-tak Shing
ICANNGA
2009
Springer
133views Algorithms» more  ICANNGA 2009»
15 years 4 months ago
Visualizing Time Series State Changes with Prototype Based Clustering
Modern process and condition monitoring systems produce a huge amount of data which is hard to analyze manually. Previous analyzing techniques disregard time information and concen...
Markus Pylvänen, Sami Äyrämö, ...
RTCSA
2006
IEEE
15 years 4 months ago
Maximizing Guaranteed QoS in (m, k)-firm Real-time Systems
(m,k)-firm constraints have been used to schedule tasks in soft/firm real-time systems under overloaded conditions. In general, they are provided by application designers to guara...
Jian (Denny) Lin, Albert M. K. Cheng