Sciweavers

780 search results - page 77 / 156
» Case Study: Model Transformations for Time-triggered Languag...
Sort
View
JUCS
2010
162views more  JUCS 2010»
13 years 2 months ago
UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture
Abstract: Model-Driven Architecture (MDA) presents a set of layered models to separate design concerns from platform concerns. The model executability for each model element is sti...
Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Le...
APSEC
2007
IEEE
14 years 2 months ago
Requirements Engineering for Reactive Systems: Coloured Petri Nets for an Elevator Controller
This paper presents a model-based approach to requirements engineering for reactive systems; we use an elevator controller as case study. We identify and justify two key propertie...
João M. Fernandes, Jens Bæk Jø...
PEPM
2009
ACM
14 years 11 days ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
EMSOFT
2007
Springer
14 years 2 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...
IACR
2011
87views more  IACR 2011»
12 years 7 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao