Sciweavers

780 search results - page 77 / 156
» Case Study: Model Transformations for Time-triggered Languag...
Sort
View
JUCS
2010
162views more  JUCS 2010»
14 years 10 months ago
UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture
Abstract: Model-Driven Architecture (MDA) presents a set of layered models to separate design concerns from platform concerns. The model executability for each model element is sti...
Jin Hyun Kim, Jin-Young Choi, Inhye Kang, Insup Le...
APSEC
2007
IEEE
15 years 10 months ago
Requirements Engineering for Reactive Systems: Coloured Petri Nets for an Elevator Controller
This paper presents a model-based approach to requirements engineering for reactive systems; we use an elevator controller as case study. We identify and justify two key propertie...
João M. Fernandes, Jens Bæk Jø...
PEPM
2009
ACM
15 years 8 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
139
Voted
EMSOFT
2007
Springer
15 years 10 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...
IACR
2011
87views more  IACR 2011»
14 years 3 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao