Sciweavers

1264 search results - page 153 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
CASES
2003
ACM
15 years 9 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
WSC
1998
15 years 5 months ago
The Use of Simulation in the Planning of the Dutch Railway Services
The design of a quality timetable for the Dutch Railways is a complex task, because of the characteristics of the railway services. The complexity of the network and the heavily i...
Jurjen S. Hooghiemstra, Maurice J. G. Tunisse
ETRICS
2006
15 years 7 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter
133
Voted
ITNG
2010
IEEE
15 years 2 months ago
Towards Adaptive Replication Reconfiguration for QoS
— Replication is a technique widely used for large networked software systems to provide qualities such as reliability, availability, performance and scalability to their clients...
Raihan Al-Ekram, Richard C. Holt
VMCAI
2009
Springer
15 years 11 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu