Sciweavers

424 search results - page 39 / 85
» The Modeling Pyramid: From Design to Production
Sort
View
ASPDAC
2010
ACM
233views Hardware» more  ASPDAC 2010»
13 years 7 months ago
Computer-aided recoding for multi-core systems
- The design of embedded computing systems faces a serious productivity gap due to the increasing complexity of their hardware and software components. One solution to address this...
Rainer Dömer
ADBIS
2006
Springer
100views Database» more  ADBIS 2006»
14 years 3 months ago
Novel Analysis Patterns in the Context of the Managed Investments Instruments
Abstract. Traditionally, the investment funds market exploits analysis and design concepts based on the procedural programming approach. We propose a set of analysis patterns which...
Luigi Ubezio, Claudia Raibulet, Antonio Carpinato
VLDB
1998
ACM
120views Database» more  VLDB 1998»
14 years 1 months ago
KODA - The Architecture And Interface of a Data Model Independent Kernel
In this paper we describe the architecture and interface of KODA, a production strength database kernel. KODA is unique in the industry in its ability to support two different dat...
Gopalan Arun, Ashok Joshi
CAD
2005
Springer
13 years 9 months ago
Frontal geometry from sketches of engineering objects: is line labelling necessary?
A tool which can quickly interpret line drawings (with hidden lines removed) of engineering objects as boundary representation CAD models would be of significant benefit in the pr...
P. A. C. Varley, Ralph R. Martin, Hiromasa Suzuki
KBSE
2007
IEEE
14 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr