Sciweavers

410 search results - page 50 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
DATE
2008
IEEE
158views Hardware» more  DATE 2008»
14 years 2 months ago
Performance Analysis of SoC Architectures Based on Latency-Rate Servers
This paper presents a method for static performance analysis of SoC architectures. The method is based on a network calculus theory known as LR servers. This network calculus is e...
Jelte Peter Vink, Kees van Berkel, Pieter van der ...
ICSM
1999
IEEE
14 years 6 hour ago
A Language Independent Approach for Detecting Duplicated Code
Code duplication is one of the factors that severely complicates the maintenance and evolution of large software systems. Techniques for detecting duplicated code exist but rely m...
Stéphane Ducasse, Matthias Rieger, Serge De...
CCGRID
2004
IEEE
13 years 11 months ago
An interactive Grid for non-invasive vascular reconstruction
We conduct computer simulation experiments in pre-operative planning of vascular reconstruction with a physician in the experimental loop. We constructed a problem-solving environ...
Peter M. A. Sloot, Alfredo Tirado-Ramos, Alfons G....
CAV
2010
Springer
173views Hardware» more  CAV 2010»
13 years 11 months ago
A Model Checker for AADL
We present a graphical toolset for verifying AADL models, which are gaining widespread acceptance in aerospace, automobile and avionics industries for comprehensively specifying sa...
Marco Bozzano, Alessandro Cimatti, Joost-Pieter Ka...
QOSA
2010
Springer
13 years 9 months ago
Architecture-Driven Reliability and Energy Optimization for Complex Embedded Systems
The use of redundant computational nodes is a widely used design tactic to improve the reliability of complex embedded systems. However, this redundancy allocation has also an effe...
Indika Meedeniya, Barbora Buhnova, Aldeida Aleti, ...