Sciweavers

3555 search results - page 95 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WIOPT
2010
IEEE
14 years 11 months ago
Analysis and design of message ferry routes in sensor networks using polling models
—We consider a Ferry based Wireless Local Area Network (FWLAN), in which information is forwarded from a base station to sensors, or gathered from sensors to a base station using...
Veeraruna Kavitha, Eitan Altman
CII
2007
88views more  CII 2007»
15 years 1 months ago
Benefits of an item-centric enterprise-data model in logistics services: A case study
The paper uses a case example to present a novel way of building enterprise information systems. The objective is to bring forth the benefits of an item centric systems design in ...
Mikko Rönkkö, Mikko Kärkkäinen...
DATE
2007
IEEE
136views Hardware» more  DATE 2007»
15 years 7 months ago
Compositional specification of behavioral semantics
An emerging common trend in model-based design of embedded software and systems is the adoption of Domain-Specific Modeling Languages (DSMLs). While syntax metamodeling enables th...
Kai Chen 0003, Janos Sztipanovits, Sandeep Neema
DAC
2003
ACM
16 years 2 months ago
Design techniques for sensor appliances: foundations and light compass case study
We propose the first systematic, sensor-centric approach for quantitative design of sensor network appliances. We demonstrate its use by designing light appliance devices and the ...
Jennifer L. Wong, Seapahn Megerian, Miodrag Potkon...
ECRTS
2006
IEEE
15 years 7 months ago
Sensitivity Analysis for Fixed-Priority Real-Time Systems
At early stages in the design of real-time embedded applications, the timing attributes of the computational activities are often incompletely specified or subject to changes. Lat...
Enrico Bini, Marco Di Natale, Giorgio C. Buttazzo