Sciweavers

1448 search results - page 138 / 290
» From Requirements to Code Revisited
Sort
View
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 10 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
147
Voted
CODES
2008
IEEE
15 years 10 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
127
Voted
AGILEDC
2007
IEEE
15 years 10 months ago
Agile Development Iterations and UI Design
Many agile projects require user interaction (UI) design, but the integration of UI design into agile development is not well understood. This is because both agile development an...
Jennifer Ferreira, James Noble, Robert Biddle
CODES
2007
IEEE
15 years 10 months ago
Embedded software development on top of transaction-level models
Early embedded SW development with transaction-level models has been broadly promoted to improve SoC design productivity. But the proposed APIs only provide low-level read/write o...
Wolfgang Klingauf, Robert Günzel, Christian S...
132
Voted
CODES
2006
IEEE
15 years 10 months ago
Bounded arbitration algorithm for QoS-supported on-chip communication
Time-critical multi-processor systems require guaranteed services in terms of throughput, bandwidth etc. in order to comply to hard real-time constraints. However, guaranteedservi...
Mohammad Abdullah Al Faruque, Gereon Weiss, Jö...