Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
The standard approach in computer-controlled systems is to sample and control periodically. In certain applications, such as networked control systems or energy-constrained system...
Abstract. In this paper, we address two key trends in the synthesis of implementations for embedded multiprocessors — (1) the increasing importance of managing interprocessor com...
Telecommunication networks have evolved in time thanks to the advances produced by the new technologies and especially, Internet. Expert systems are being applied in management of...