Sciweavers

3441 search results - page 391 / 689
» Provenance of Software Development Processes
Sort
View
ICST
2009
IEEE
15 years 2 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
ICSE
2011
IEEE-ACM
14 years 7 months ago
Predictable dynamic deployment of components in embedded systems
—Dynamic reconfiguration – the ability to hot swap a component, or to introduce a new component into the system – is essential to supporting evolutionary change in long-live ...
Ana Petricic
ISPA
2007
Springer
15 years 10 months ago
Parallelization Strategies for the Points of Interests Algorithm on the Cell Processor
The Cell processor is a typical example of a heterogeneous multiprocessor-on-chip architecture that uses several levels of parallelism to deliver high performance. Closing the gap ...
Tarik Saidani, Lionel Lacassagne, Samir Bouaziz, T...
138
Voted
UML
1997
Springer
15 years 8 months ago
Systems, Views and Models of UML
In this paper we show by using the example of UML, how a software engineering method can bene t from an integrative mathematical foundation. The mathematical foundation is given b...
Ruth Breu, Radu Grosu, Franz Huber, Bernhard Rumpe...
FOAL
2009
ACM
15 years 11 months ago
Enhancing base-code protection in aspect-oriented programs
Aspect-oriented programming (AOP) promises to localize concerns that inherently crosscut the primary structural decomposition of a software system. Localization of concerns is cri...
Mohamed ElBendary, John Boyland