Sciweavers

3281 search results - page 507 / 657
» An Approach to use Executable Models for Testing
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 2 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
MIDDLEWARE
2005
Springer
14 years 3 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
ISLPED
1999
ACM
137views Hardware» more  ISLPED 1999»
14 years 2 months ago
Energy-efficient design of battery-powered embedded systems
—Energy-efficient design of battery-powered systems demands optimizations in both hardware and software. We present a modular approach for enhancing instruction level simulators ...
Tajana Simunic, Luca Benini, Giovanni De Micheli
CASES
2006
ACM
14 years 2 months ago
Efficient architectures through application clustering and architectural heterogeneity
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Lukasz Strozek, David Brooks
EUROMICRO
2006
IEEE
14 years 1 months ago
Building Reconfigurable Component-Based OS with THINK
Dynamic reconfiguration allows modifying a system during its execution, and can be used to apply patches and updates, to implement adaptive systems, dynamic instrumentation, or to...
Juraj Polakovic, Ali Erdem Özcan, Jean-Bernar...