Sciweavers

3555 search results - page 18 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
149
Voted
ICRA
1999
IEEE
114views Robotics» more  ICRA 1999»
15 years 8 months ago
A Human-Robot Interface Using an Extended Digital Desk
MuchattentionhasrecentlybeenpaidtoAugmented Reality (AR) systems, which can enhance a human's dailylife by blending multi-modalinformation with the real world. Most existing ...
Maho Terashima, Shigeyuki Sakane
139
Voted
IPPS
2003
IEEE
15 years 9 months ago
Effective Utilization and Reconfiguration of Distributed Hardware Resources Using Job Management Systems
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...
152
Voted
CCS
2006
ACM
15 years 7 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
182
Voted
ICSEA
2009
IEEE
15 years 1 months ago
Development of CMS-Based Web-Applications Using a Model-Driven Approach
The emerging Model-Driven Engineering paradigm advocates the use of models as first-class citizens in the software development process, while artifacts such as documentation and so...
João de Sousa Saraiva, Alberto Rodrigues da...
144
Voted
SDL
2007
171views Hardware» more  SDL 2007»
15 years 5 months ago
Model Driven Development and Code Generation: An Automotive Case Study
Describing an application as a simple composition of services allows advanced features that exploit different platforms to be conceived e formalized at a high abstraction level. S...
Michele Banci, Alessandro Fantechi, Stefania Gnesi...