Sciweavers

2838 search results - page 335 / 568
» Verifying Controlled Components
Sort
View
102
Voted
KBSE
2008
IEEE
15 years 7 months ago
Using Simulation to Investigate Requirements Prioritization Strategies
—Agile and traditional plan-based approaches to software system development both agree that prioritizing requirements is an essential activity. They differ in basic strategy - wh...
Daniel Port, Alexy Olkov, Tim Menzies
RSP
2008
IEEE
118views Control Systems» more  RSP 2008»
15 years 7 months ago
Functional DIF for Rapid Prototyping
Dataflow formalisms have provided designers of digital signal processing systems with optimizations and guarantees to arrive at quality prototypes quickly. As system complexity in...
William Plishker, Nimish Sane, Mary Kiemb, Kapil A...
102
Voted
RTAS
2008
IEEE
15 years 7 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
93
Voted
CISIS
2007
IEEE
15 years 7 months ago
Implementation and Performance of a New Teleconference System by High Definition Omni-Directional Video Transmission over IP Net
In this paper, a flexible middleware system for omni-directional video transmission for various teleconferencing applications is introduced. The omni-directional image has more ad...
Yosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka...
87
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...