Sciweavers

1390 search results - page 137 / 278
» Software Systems Integration and Architectural Analysis - A ...
Sort
View
CASES
2007
ACM
15 years 8 months ago
Eliminating inter-process cache interference through cache reconfigurability for real-time and low-power embedded multi-tasking
We propose a technique which leverages configurable data caches to address the problem of cache interference in multitasking embedded systems. Data caches are often necessary to p...
Rakesh Reddy, Peter Petrov
IFIP
2007
Springer
15 years 10 months ago
Identity as a Service - Towards a Service-Oriented Identity Management Architecture
Service-oriented architecture (SOA) will form the basis of future information systems. Web services are a promising way to implement SOA enabling the loose coupling of functionalit...
Christian Emig, Frank Brandt, Sebastian Kreuzer, S...
ICFEM
2009
Springer
15 years 11 months ago
Implementing and Applying the Stocks-Carrington Framework for Model-Based Testing
In this paper we describe the functional features and the architecture of a tool implementing the Stocks-Carrington framework (TTF) for model based testing (MBT). The resulting pro...
Maximiliano Cristiá, Pablo Rodríguez...
CASES
2003
ACM
15 years 9 months ago
A low-power accelerator for the SPHINX 3 speech recognition system
Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice interfaces is clearly important. The continuous natur...
Binu K. Mathew, Al Davis, Zhen Fang
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard