Sciweavers

3555 search results - page 122 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
HYBRID
2003
Springer
15 years 6 months ago
Reachability Analysis of Nonlinear Systems Using Conservative Approximation
Abstract. In this paper we present an approach to approximate reachability computation for nonlinear continuous systems. Rather than studying a complex nonlinear system ˙x = g(x),...
Eugene Asarin, Thao Dang, Antoine Girard
INFOCOM
2002
IEEE
15 years 6 months ago
Clock Synchronization Algorithms for Network Measurements
Abstract—Packet delay traces are important measurements for analyzing end-to-end performance and for designing traffic control algorithms in computer networks. Due to the fact t...
Li Zhang, Zhen Liu, Cathy H. Xia
IWC
2007
134views more  IWC 2007»
15 years 1 months ago
Disrupting digital library development with scenario informed design
In recent years, there has been great interest in scenario-based design and other forms of user-centred design. However, there are many design processes that, often for good reaso...
Ann Blandford, Suzette Keith, Richard Butterworth,...
ECOOP
2008
Springer
15 years 3 months ago
A Case Study for Aspect Based Updating
Rather than upgrading a software system to the next version by installing a new binary, software systems could be updated "on-thefly" during their execution. We are devel...
Susanne Cech Previtali, Thomas R. Gross
CASES
2008
ACM
15 years 3 months ago
VESPA: portable, scalable, and flexible FPGA-based vector processors
While soft processors are increasingly common in FPGAbased embedded systems, it remains a challenge to scale their performance. We propose extending soft processor instruction set...
Peter Yiannacouras, J. Gregory Steffan, Jonathan R...