Sciweavers

3911 search results - page 30 / 783
» Using Operational Architecture to Model Embedded Software
Sort
View
CODES
2006
IEEE
15 years 8 months ago
TLM/network design space exploration for networked embedded systems
This paper presents a methodology to combine Transaction Level Modeling and System/Network co-simulation for the design of networked embedded systems. As a result, a new design di...
Nicola Bombieri, Franco Fummi, Davide Quaglia
CODES
2010
IEEE
15 years 11 days ago
Automatic parallelization of embedded software using hierarchical task graphs and integer linear programming
The last years have shown that there is no way to disregard the advantages provided by multiprocessor System-on-Chip (MPSoC) architectures in the embedded systems domain. Using mu...
Daniel Cordes, Peter Marwedel, Arindam Mallik
EMSOFT
2007
Springer
15 years 8 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis
AAAI
1997
15 years 3 months ago
Using a Robot Control Architecture to Automate Space Shuttle Operations
This paper describes preliminary results from using an AI robot control software architecture, known as 3T, as the software framework for a procedure tracking system for the space...
R. Peter Bonasso, David Kortenkamp, Troy Whitney
128
Voted
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 7 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...