The design of state-of-the-art, complex embedded systems requires the capability of modeling and simulating the complex networked environment in which such systems operate. This i...
Franco Fummi, Giovanni Perbellini, Paolo Gallo, Ma...
This paper deals with large, distributed real-time systems that have execution times and resource utilizations which cannot be characterized a priori. (The motivation for our work ...
Lonnie R. Welch, Michael W. Masters, Leslie A. Mad...
—In this paper, we propose two adaptive scheduling approaches to support real-time control applications with highly varying computation times. The use of a resource reservation s...
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
A number of problems are well suited for volumetric representation for both simulation and storage, however, the large amount of data that needs to be processed and rendered with ...
Shigeru Muraki, Eric B. Lum, Kwan-Liu Ma, Masato O...