Sciweavers

3555 search results - page 148 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
155
Voted
POS
1994
Springer
15 years 7 months ago
Expressing Object Residency Optimizations Using Pointer Type Annotations
We consider some issues in optimizing persistent programming languages. In particular, we show how to express optimizations of object residency checks in strongly typed persistent...
J. Eliot B. Moss, Antony L. Hosking
166
Voted
CBSE
2011
Springer
14 years 3 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
189
Voted
ICDAR
2009
IEEE
15 years 1 months ago
Design Compact Recognizers of Handwritten Chinese Characters Using Precision Constrained Gaussian Models, Minimum Classification
In our previous work, a precision constrained Gaussian model (PCGM) was proposed for character modeling to design compact recognizers of handwritten Chinese characters. A maximum ...
Yongqiang Wang, Qiang Huo
118
Voted
EURODAC
1994
IEEE
124views VHDL» more  EURODAC 1994»
15 years 7 months ago
Automotive databus simulation using VHDL
developed and standardised, for example CAN[1][2], J1850[3]. THE ELECTRONIC VEHICLE TODAYVHDL has been used to develop a simulator for automotive databus networks. This is a design...
Karen Hale
HASE
2007
IEEE
15 years 7 months ago
Model Validation using Automatically Generated Requirements-Based Tests
In current model-based development practice, validation that we are building a correct model is achieved by manually deriving requirements-based test cases for model testing. Mode...
Ajitha Rajan, Michael W. Whalen, Mats Per Erik Hei...