Sciweavers

1407 search results - page 144 / 282
» Using Use Cases in Executable Z
Sort
View
ICECCS
1998
IEEE
161views Hardware» more  ICECCS 1998»
15 years 8 months ago
A Method and a Technique to Model and Ensure Timeliness in Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring timeliness in safety critical systems. First, we introduce a method and its associated technique to model both real-time ta...
Christophe Aussaguès, Vincent David
OPODIS
2008
15 years 5 months ago
Impact of Information on the Complexity of Asynchronous Radio Broadcasting
We consider asynchronous deterministic broadcasting in radio networks. An execution of a broadcasting protocol is a series of events, each of which consists of simultaneous transm...
Tiziana Calamoneri, Emanuele G. Fusco, Andrzej Pel...
ENTCS
2007
114views more  ENTCS 2007»
15 years 4 months ago
Parametric Performance Contracts for Software Components with Concurrent Behaviour
Performance prediction methods for component-based software systems aim at supporting design decisions of software architects during early development stages. With the increased a...
Jens Happe, Heiko Koziolek, Ralf Reussner
CASES
2010
ACM
15 years 2 months ago
Mighty-morphing power-SIMD
In modern wireless devices, two broad classes of compute-intensive applications are common: those with high amounts of data-level parallelism, such as signal processing used in wi...
Ganesh S. Dasika, Mark Woh, Sangwon Seo, Nathan Cl...
ICAI
2010
15 years 2 months ago
Constraint-Based Dogleg Channel Routing with Via Minimization
- In this article, we present an algorithm which is capable of transforming a gridded dogleg channel routing problem into a constraint programming (CP) problem. The transformed CP ...
I-Lun Tseng, Huan-Wen Chen, Che-I Lee, Adam Postul...