Sciweavers

2875 search results - page 509 / 575
» Using separation of concerns for embedded systems design
Sort
View
CEEMAS
2001
Springer
15 years 2 months ago
UML for Behavior-Oriented Multi-agent Simulations
Developing multi-agent simulations seems to be rather straight forward, as active entities in the original correspond to active agents in the model. Thus plausible behaviors can be...
Christoph Oechslein, Franziska Klügl, Rainer ...
DAC
2002
ACM
15 years 10 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...
ESORICS
2007
Springer
15 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
RTAS
2005
IEEE
15 years 3 months ago
Improving WCET by Optimizing Worst-Case Paths
It is advantageous to perform compiler optimizations to lower the WCET of a task since tasks with lower WCETs are easier to schedule and more likely to meet their deadlines. Compi...
Wankang Zhao, William C. Kreahling, David B. Whall...
RTCSA
2005
IEEE
15 years 3 months ago
On Building a Reflective Middleware Service for Location-Awareness
Location based services are becoming essential feature of context-awareness in ubiquitous computing. Reflective distribute component programming model is proposed to systematicall...
Uzair Ahmad, Uzma Nasir, Mahrin Iqbal, Young-Koo L...