Sciweavers

757 search results - page 8 / 152
» Composing Security-Aware Software
Sort
View
WCET
2008
14 years 8 days ago
On Composable System Timing, Task Timing, and WCET Analysis
The complexity of hardware and software architectures used in today's embedded systems make a hierarchical, composable timing analysis impossible. This paper describes the so...
Peter P. Puschner, Martin Schoeberl
EUROMICRO
2006
IEEE
14 years 4 months ago
Composing Components in Design Phase using Exogenous Connectors
Composition can take place during different stages of component life cycle. We identify two main stages : design phase - components are composed into composite components for reus...
Kung-Kiu Lau, Ling Ling, Zheng Wang
ACMACE
2009
ACM
14 years 2 months ago
Music box: composing and performing visual music
Music Box is an artistic implementation of emergent behavior and its use to create music. Music Box employs Craig Reynold's flocking algorithm to display animated notes that ...
Lindsay Grace
APSEC
2007
IEEE
14 years 5 months ago
Coordination-Policy Based Composed System Behavior Derivation
The coordination-policy that components interactions satisfied often determines the properties of nowadays component-based information systems, e.g. Safety, Liveness and Fairness ...
Yiming Lau, Wenyun Zhao, Xin Peng, Zhixiong Jiang,...
FIW
2007
123views Communications» more  FIW 2007»
14 years 9 days ago
Composing Features by Managing Inconsistent Requirements
Abstract. One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferri...
Robin C. Laney, Thein Than Tun, Michael Jackson, B...