Sciweavers

264 search results - page 30 / 53
» Time Constraint Patterns for Event B Development
Sort
View
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Design and Implementation of a Multimedia Personalized Service Over Large Scale Networks
In this paper, we proposed to setup a distributed multimedia system which aggregates the capacity of multiple servers to provide customized multimedia services in a cost-effective...
Xiaorong Li, Terence Gih Guang, Bharadwaj Veeraval...
DAC
2010
ACM
13 years 10 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 18 days ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
GLOBECOM
2010
IEEE
13 years 5 months ago
Routing and Scheduling in Distributed Advance Reservation Networks
Advance reservation of connection requests is a growing focus area and a range of solutions have been proposed. However, most efforts here have focused on scheduling algorithm desi...
Chongyang Xie, Hamad Alazemi, Nasir Ghani
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi