Sciweavers

489 search results - page 57 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
97
Voted
EMSOFT
2007
Springer
15 years 6 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant
119
Voted
KBSE
2005
IEEE
15 years 6 months ago
QoS-aware dynamic service composition in ambient intelligence environments
Due to the large success of wireless networks and handheld devices, the ambient intelligence (AmI) paradigm is becoming a reality. One of the most challenging objectives to achiev...
Sonia Ben Mokhtar, Jinshan Liu, Nikolaos Georganta...
91
Voted
ASPDAC
2007
ACM
129views Hardware» more  ASPDAC 2007»
15 years 4 months ago
ECO-system: Embracing the Change in Placement
In a realistic design flow, circuit and system optimizations must interact with physical aspects of the design. For example, improvements in timing and power may require replacing ...
Jarrod A. Roy, Igor L. Markov
COMSWARE
2008
IEEE
15 years 7 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain
121
Voted
KBSE
2005
IEEE
15 years 6 months ago
Prufrock: a framework for constructing polytypic theorem provers
Current formal software engineering methodologies provide a vast array of languages for specifying correctness properties, as well as a wide assortment automated tools that aid in...
Justin Ward, Garrin Kimmell, Perry Alexander