Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
We present an end-to-end tool-chain for model-based design and analysis of component-based embedded realtime software, with Avionics Mission Computing as an application domain. Th...
Zonghua Gu, Shige Wang, Sharath Kodase, Kang G. Sh...
In this paper, we discuss a method and the associated tool support able to exploit Web services in model-based user interface development, starting with the results of a task anal...
This paper presents one MEMS design tool with total six design flows, which makes it possible that the MEMS designers are able to choose the most suitable design flow for their sp...
MoLIC, a modeling language for designing interaction as a metaphor of conversation, was proposed to allow designers to build a blueprint of all interaction that may take place whe...