Sciweavers

2578 search results - page 116 / 516
» Performance modeling for early analysis of multi-core system...
Sort
View
DATE
2010
IEEE
111views Hardware» more  DATE 2010»
14 years 2 months ago
Evaluation of runtime task mapping heuristics with rSesame - a case study
Abstract—rSesame is a generic modeling and simulation framework which can explore and evaluate reconfigurable systems at the early design stages. The framework can be used to ex...
Kamana Sigdel, Mark Thompson, Carlo Galuzzi, Andy ...
ITEE
2007
13 years 10 months ago
Knowledge Acquisition and Risk Analysis in Material Recovery Facilities by a Virtual Team
1 A knowledge acquisition process that has been implemented by a virtual team for the development of a knowledge based early warning system in Material Recovery Facilities (MRFs) o...
Ioannis M. Dokas, Konstantinos Kitis, Christos Dod...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
SIGADA
2007
Springer
14 years 3 months ago
AADL modeling and analysis of hierarchical schedulers
A system based on a hierarchical scheduler is a system in which the processor is shared between several collaborative schedulers. Such schedulers exist since 1960 and they are bec...
Frank Singhoff, Alain Plantec
DAC
2003
ACM
14 years 10 months ago
Accurate timing analysis by modeling caches, speculation and their interaction
Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysi...
Xianfeng Li, Tulika Mitra, Abhik Roychoudhury