Sciweavers

151 search results - page 25 / 31
» Reuse through Requirements Traceability
Sort
View
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
GCC
2006
Springer
13 years 11 months ago
General Running Service: An Execution Framework for Executing Legacy Program on Grid
Legacy program execution system, which is necessary for Grid to enable users to reuse all legacy programs without reengineering source codes, is still an open problem. We propose ...
Likun Liu, Yongwei Wu, Guangwen Yang, Ruyue Ma, Fe...
CIDR
2009
161views Algorithms» more  CIDR 2009»
13 years 8 months ago
A Case for A Collaborative Query Management System
Over the past 40 years, database management systems (DBMSs) have evolved to provide a sophisticated variety of data management capabilities. At the same time, tools for managing q...
Nodira Khoussainova, Magdalena Balazinska, Wolfgan...
CII
2006
107views more  CII 2006»
13 years 7 months ago
A layered approach to automated electrical safety analysis in automotive environments
Software support for the automotive electrical design process is vital, as many of the safety analysis tasks needing to be carried out, while complex, are repetitive and time cons...
C. J. Price, N. A. Snooke, S. D. Lewis
CSL
2009
Springer
14 years 2 months ago
Nested Hoare Triples and Frame Rules for Higher-Order Store
Separation logic is a Hoare-style logic for reasoning about programs with heap-allocated mutable data structures. As a step toward extending separation logic to high-level language...
Jan Schwinghammer, Lars Birkedal, Bernhard Reus, H...