This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
The analysis of the amount of human resources required to complete a project is felt as a critical issue in any company of the electronics industry. In particular, early estimatin...
William Fornaciari, Fabio Salice, Daniele Paolo Sc...
Despite many competitors, Ethernet became the dominant protocol for local area networking due to its simplicity, robustness, and efficiency in wide variety of conditions and tech...
A lightweight fact extractor is presented that utilizes XML tools, such as XPath and XSLT, to extract static information from C++ source code programs. The source code is first co...
Michael L. Collard, Huzefa H. Kagdi, Jonathan I. M...
To address the limitations of centralized shared storage for cloud computing, we are building Lithium, a distributed storage system designed specifically for virtualization workl...