Sciweavers

186 search results - page 27 / 38
» On Modeling Software Architecture Recovery as Graph Matching
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ENTCS
2002
89views more  ENTCS 2002»
13 years 8 months ago
ZEUS: A Distributed Timed Model-Checker Based on KRONOS
In this work we present Zeus, a Distributed Model-Checker that evolves from the tool Kronos [8] and that currently can handle backwards computation of TCTLreachability properties ...
Víctor A. Braberman, Alfredo Olivero, Ferna...
ICCD
2005
IEEE
165views Hardware» more  ICCD 2005»
14 years 5 months ago
Applying Resource Sharing Algorithms to ADL-driven Automatic ASIP Implementation
Presently, Architecture Description Languages (ADLs) are widely used to raise the abstraction level of the design space exploration of Application Specific Instruction-set Proces...
Ernst Martin Witte, Anupam Chattopadhyay, Oliver S...
DAC
2006
ACM
14 years 9 months ago
Efficient simulation of critical synchronous dataflow graphs
Simulation and verification using electronic design automation (EDA) tools are key steps in the design process for communication and signal processing systems. The synchronous dat...
Chia-Jui Hsu, José Luis Pino, Ming-Yung Ko,...
BTW
2009
Springer
138views Database» more  BTW 2009»
14 years 3 months ago
GEM: A Generic Visualization and Editing Facility for Heterogeneous Metadata
: Many model management tasks, e.g., schema matching or merging, require the manual handling of metadata. Given the diversity of metadata, its many different representations and mo...
Jürgen Göres, Thomas Jörg, Boris St...