Sciweavers

853 search results - page 59 / 171
» New test approach for embedded applications
Sort
View
IEEEARES
2010
IEEE
15 years 5 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
SAFECOMP
1998
Springer
15 years 5 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
115
Voted
ECRTS
2003
IEEE
15 years 6 months ago
Schedulability Analysis for Distributed Heterogeneous Time/Event Triggered Real-Time Systems
This paper deals with specific issues related to the design of distributed embedded systems implemented with mixed, event-triggered and time-triggered task sets, which communicate...
Traian Pop, Petru Eles, Zebo Peng
CVPR
2010
IEEE
15 years 10 months ago
Surface Extraction from Binary Volumes with Higher-Order Smoothness
A number of 3D shape reconstruction algorithms, in particular 3D image segmentation methods, produce their results in the form of binary volumes, where a binary value indicates whe...
Victor Lempitsky
OOIS
2001
Springer
15 years 5 months ago
From Use Cases to Objects: An Industrial Information Systems Case Study Analysis
Identifying the objects that constitute a software system is a critical task for any object-oriented system development and several techniques have already been introduced to tack...
João M. Fernandes, Ricardo Jorge Machado