Sciweavers

3555 search results - page 106 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CODES
2000
IEEE
15 years 6 months ago
Memory architecture for efficient utilization of SDRAM: a case study of the computation/memory access trade-off
This paper discusses the trade-off between calculations and memory accesses in a 3D graphics tile renderer for visualization of data from medical scanners. The performance require...
Thomas Gleerup, Hans Holten-Lund, Jan Madsen, Stee...
HICSS
2006
IEEE
120views Biometrics» more  HICSS 2006»
15 years 7 months ago
Reconciling the Irreconcilable? A Software Development Approach that Combines Agile with Formal
Unstable software requirements are common and call for Agile practices. On the other hand, quality standards and recommendations, to which companies must adhere to play in selecte...
José Gonçalo A. Oliveira Basto da Si...
DATE
2006
IEEE
108views Hardware» more  DATE 2006»
15 years 7 months ago
Software-friendly HW/SW co-simulation: an industrial case study
This paper proposes a novel HW/SW co-simulation approach that minimizes the impact on software designers. We propose a SystemC-based system that enables the software team to test ...
Juanjo Noguera, Luis Baldez, Narcis Simon, Lluis A...
SNPD
2003
15 years 2 months ago
An Industrial Experience in Comparing Manual vs. Automatic Test Cases Generation
We present our experience in automatically deriving a detailed test case plan exclusively using the UML diagrams developed during the analysis and design phases. We consider in pa...
Francesca Basanieri, Pierpaolo Iani, Gaetano Lomba...
FMSD
2006
119views more  FMSD 2006»
15 years 1 months ago
Feature interaction detection by pairwise analysis of LTL properties - A case study
A Promela specification and a set of temporal properties are developed for a basic call service with a number of features. The properties are expressed in the logic LTL. Interactio...
Muffy Calder, Alice Miller