Sciweavers

289 search results - page 30 / 58
» Verification Patterns for Rapid Embedded System Verification
Sort
View
138
Voted
JTRES
2010
ACM
15 years 2 months ago
Static checking of safety critical Java annotations
The Safety Critical Java Specification intends to support the development of programs that must be certified. The specification includes a number of annotations used to constrain ...
Daniel Tang, Ales Plsek, Jan Vitek
CODES
2006
IEEE
15 years 8 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
132
Voted
CIA
2000
Springer
15 years 7 months ago
Design of Collaborative Information Agents
Effective development of nontrivial systems of collaborative information agents requires that an in-depth analysis is made resulting in (1) specification of requirements at differe...
Catholijn M. Jonker, Matthias Klusch, Jan Treur
117
Voted
EMSOFT
2004
Springer
15 years 8 months ago
A metrics system for quantifying operational coupling in embedded computer control systems
One central issue in system structuring and quality prediction is the interdependencies of system modules. This paper proposes a novel technique for determining the operational co...
De-Jiu Chen, Martin Törngren
PR
2006
114views more  PR 2006»
15 years 2 months ago
Orientation feature for fingerprint matching
This paper describes a fingerprint verification algorithm based on the orientation field. The orientation field of a fingerprint image has also been used for image alignment. Area...
Jayant V. Kulkarni, Bhushan D. Patil, Raghunath S....