: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Developing highly efficient and reliable embedded systems demands hardware/software (HW/SW) co-design and, therefore, co-simulation. In order to be highly configurable, embedded...
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
Current software component models lack compositionality. Most of them also do not have both active and passive components. In this paper, we show how we can define a compositiona...
-- While a large fraction of application code is devoted to graphical user interface (GUI) functions, support for reuse in this domain has largely been confined to the creation of...
Richard N. Taylor, Nenad Medvidovic, Kenneth M. An...