Among various metadata design difficulties, 1) designing subsumption relation of two classes, 2) designing diverse properties of a given class, and 3) determining whether an item...
Compositional Scheduling Analysis couples local scheduling analysis via event streams. While local analysis has successfully been extended to include hierarchical scheduling strat...
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
A software system interacts with its environment through system interfaces. Robustness of software systems are governed by various temporal properties related to these interfaces,...
Hardware/software co-verification is becoming an indispensable tool for building highly trustworthy embedded systems. A stumbling block to effective co-verification using model ch...