Sciweavers

1264 search results - page 112 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 11 months ago
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling
— The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logic...
Innocentia Dlamini, Martin Olivier, Sihle Sibiya
ISCA
2007
IEEE
182views Hardware» more  ISCA 2007»
15 years 10 months ago
Configurable isolation: building high availability systems with commodity multi-core processors
High availability is an increasingly important requirement for enterprise systems, often valued more than performance. Systems designed for high availability typically use redunda...
Nidhi Aggarwal, Parthasarathy Ranganathan, Norman ...
BMCBI
2006
88views more  BMCBI 2006»
15 years 4 months ago
RiboSubstrates: a web application addressing the cleavage specificities of ribozymes in designated genomes
Background: RNA-dependent gene silencing is becoming a routine tool used in laboratories worldwide. One of the important remaining hurdles in the selection of the target sequence,...
Jean-François Lucier, Lucien Junior Bergero...
RTAS
2008
IEEE
15 years 11 months ago
WCET Analysis for Multi-Core Processors with Shared L2 Instruction Caches
Multi-core chips have been increasingly adopted by microprocessor industry. For real-time systems to safely harness the potential of multi-core computing, designers must be able t...
Jun Yan, Wei Zhang
IPCCC
2007
IEEE
15 years 10 months ago
First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle
Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means t...
Marco Roccetti, Mario Gerla, Claudio E. Palazzi, S...