Sciweavers

1723 search results - page 221 / 345
» Generalized file system dependencies
Sort
View
153
Voted
HOST
2008
IEEE
15 years 11 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
EDOC
2007
IEEE
15 years 11 months ago
Survey of Traceability Approaches in Model-Driven Engineering
Models have been used in various engineering fields to help managing complexity and represent information in difbstraction levels, according to specific notations and stakeholde...
Ismênia Galvão, Arda Goknil
EDCC
2005
Springer
15 years 11 months ago
Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA)
Abstract. In this paper we present the formal safety analysis of a radiobased railroad crossing. We use deductive cause-consequence analysis (DCCA) as analysis method. DCCA is a no...
Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn
EMSOFT
2005
Springer
15 years 10 months ago
A unified HW/SW interface model to remove discontinuities between HW and SW design
One major challenge in System-on-Chip (SoC) design is the definition and design of interfaces between hardware and software. Traditional ASIC designer and software designer model ...
Aimen Bouchhima, Xi Chen, Frédéric P...
GECCO
2004
Springer
129views Optimization» more  GECCO 2004»
15 years 10 months ago
Memetic Optimization of Video Chain Designs
Abstract. Improving image quality is the backbone of highly competitive display industry. Contemporary video processing system design is a challenging optimization problem. General...
Walid Ali, Alexander P. Topchy