Sciweavers

2811 search results - page 435 / 563
» Real-Time Component-Based Systems
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 9 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
RTAS
2009
IEEE
14 years 3 months ago
On Time-Aware Instrumentation of Programs
—Software instrumentation is a key technique in many stages of the development process. It is of particular importance for debugging embedded systems. Instrumented programs produ...
Sebastian Fischmeister, Patrick Lam
RTCSA
2009
IEEE
14 years 3 months ago
Towards Hardware Support for Common Sensor Processing Tasks
—Sensor processing is a common task within many embedded system domains, such as in control systems, the sensor feedback is used for actuator control. In this paper we have surve...
Adwait Gupte, Phillip Jones
FDL
2008
IEEE
14 years 3 months ago
Model-based Design Space Exploration for RTES with SysML and MARTE
The features of the emerging modeling languages for system design allow designers to build models of almost any kind of heterogeneous hardware-software systems, including Real Tim...
Marcello Mura, Luis Gabriel Murillo, Mauro Prevost...
RTAS
2007
IEEE
14 years 3 months ago
Preemption Threshold Scheduling: Stack Optimality, Enhancements and Analysis
Using preemption threshold scheduling (PTS) in a multi-threaded real-time embedded system reduces system preemptions and hence reduces run-time overhead while still ensuring real-...
Rony Ghattas, Alexander G. Dean