Sciweavers

536 search results - page 58 / 108
» Reusing Models of Different Abstraction Levels
Sort
View
IWSEC
2010
Springer
14 years 8 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
ASWSD
2006
Springer
15 years 1 months ago
TestML - A Test Exchange Language for Model-Based Testing of Embedded Software
Abstract. Test processes in the automotive industry are tool-intensive and affected by technologically heterogeneous test infrastructures. In the industrial practice a product has ...
Juergen Grossmann, Ines Fey, Alexander Krupp, Mirk...
84
Voted
CODES
2006
IEEE
15 years 4 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst
DAGM
2005
Springer
15 years 3 months ago
Three-Dimensional Shape Knowledge for Joint Image Segmentation and Pose Estimation
Abstract. This paper presents the integration of 3D shape knowledge into a variational model for level set based image segmentation and tracking. Having a 3D surface model of an ob...
Thomas Brox, Bodo Rosenhahn, Joachim Weickert
FDL
2005
IEEE
15 years 3 months ago
SystemC-Based Communication and Performance Analysis
In today’s electronic system-level (ESL) design processes, an early analysis of a system’s communication and nce characteristics is becoming a key challenge. The availability ...
Axel G. Braun, Joachim Gerlach, Wolfgang Rosenstie...