Abstract-- Hard real-time systems need methods to determine upper bounds for their execution times, usually called worst-case execution times. Timing anomalies are counterintuitive...
Jochen Eisinger, Ilia Polian, Bernd Becker, Alexan...
In this paper, we show how to establish correctness and time bounds (e.g., quality of service guarantees) for multi-agent systems composed of communicating rule-based agents. The f...
This paper proposes an advanced cut-and-paste editing for three-dimensional models. We introduce a new parameterization technique based on constrained B-spline surface/volume fitt...
Yoshiyuki Furukawa, Hiroshi Masuda, Kenjiro T. Miu...
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Product families promote reuse of software artifacts such as architectures, designs and implementations. Product family architectures are difficult to create due to the need to sup...
Alexander Egyed, Nikunj R. Mehta, Nenad Medvidovic