Sciweavers

3555 search results - page 18 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICRA
1999
IEEE
114views Robotics» more  ICRA 1999»
15 years 5 months ago
A Human-Robot Interface Using an Extended Digital Desk
MuchattentionhasrecentlybeenpaidtoAugmented Reality (AR) systems, which can enhance a human's dailylife by blending multi-modalinformation with the real world. Most existing ...
Maho Terashima, Shigeyuki Sakane
IPPS
2003
IEEE
15 years 6 months ago
Effective Utilization and Reconfiguration of Distributed Hardware Resources Using Job Management Systems
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...
CCS
2006
ACM
15 years 5 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
ICSEA
2009
IEEE
14 years 11 months ago
Development of CMS-Based Web-Applications Using a Model-Driven Approach
The emerging Model-Driven Engineering paradigm advocates the use of models as first-class citizens in the software development process, while artifacts such as documentation and so...
João de Sousa Saraiva, Alberto Rodrigues da...
SDL
2007
171views Hardware» more  SDL 2007»
15 years 2 months ago
Model Driven Development and Code Generation: An Automotive Case Study
Describing an application as a simple composition of services allows advanced features that exploit different platforms to be conceived e formalized at a high abstraction level. S...
Michele Banci, Alessandro Fantechi, Stefania Gnesi...