Sciweavers

3555 search results - page 67 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IESS
2007
Springer
143views Hardware» more  IESS 2007»
15 years 7 months ago
Embedded Software Development in a System-Level Design Flow
Abstract System level design is considered a major approach to tackle the complexity of modern System-on-Chip designs. Embedded software within SoCs is gaining importance as it add...
Gunar Schirner, Gautam Sachdeva, Andreas Gerstlaue...
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 7 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
LREC
2008
110views Education» more  LREC 2008»
15 years 2 months ago
Developing Non-European Translation Pairs in a Medium-Vocabulary Medical Speech Translation System
We describe recent work on MedSLT, a medium-vocabulary interlingua-based medical speech translation system, focussing on issues that arise when handling languages of which the gra...
Pierrette Bouillon, Sonia Halimi, Yukie Nakao, Kyo...
DAGSTUHL
2007
15 years 2 months ago
A Case for Deconstructing Hardware Transactional Memory Systems
Major hardware and software vendors are curious about transactional memory (TM), but are understandably cautious about committing to hardware changes. Our thesis is that deconstru...
Mark D. Hill, Derek Hower, Kevin E. Moore, Michael...
DAGSTUHL
2003
15 years 2 months ago
Traceability and Evaluation in Scenario Analysis by Use Case Maps
The Use Case Map (UCM) scenario notation has some strong features related to rapid capture and evaluation of requirements models. In this paper, we explain how a UCM model was deve...
Dorin Bogdan Petriu, Daniel Amyot, C. Murray Woods...