Sciweavers

1468 search results - page 59 / 294
» On Industrial Use of Requirements Engineering Techniques
Sort
View
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
14 years 7 months ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
SEFM
2007
IEEE
15 years 4 months ago
Proving Termination by Divergence
We describe a simple and efficient algorithm for proving the termination of a class of loops with nonlinear assignments to variables. The method is based on divergence testing fo...
Domagoj Babic, Alan J. Hu, Zvonimir Rakamaric, Byr...
65
Voted
ICSE
2003
IEEE-ACM
15 years 10 months ago
An Effective Layout Adaptation Technique for a Graphical Modeling Tool
Editing graphic models always entails layout problems. Inserting and deleting items requires tedious manual work for shifting existing items and rearranging the diagram layout. He...
Christian Seybold, Martin Glinz, Silvio Meier, Nan...
IDTRUST
2010
ACM
15 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
IEEEARES
2007
IEEE
15 years 4 months ago
On the use of one-way chain based authentication protocols in secure control systems
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
Bogdan Groza, Toma-Leonida Dragomir