Search results

Jump to: navigation, search
  • exploitation of theory through methods and tools for system * software specification, refinement, verification and testing
    8 KB (1,085 words) - 18:01, 12 February 2009
  • - automata for system analysis and programme verification
    7 KB (994 words) - 23:06, 14 October 2008
  • * Reasoning over MOF-based models using ontologies: verification and * Ontology connectors to system models: methods and techniques for
    8 KB (994 words) - 23:09, 14 October 2008
  • ...ications often require the creation of a collaborative workflow management system as part of their sophisticated problem solving processes so that e-scientis · Workflow verification and validation in grid environments
    7 KB (886 words) - 23:10, 14 October 2008
  • ...ng the management of experiment routines, a scientific workflow management system hides the underlying integration details of the e-Science resources and all ...tions were organized as three sessions: scientific workflows applications, system architecture and middleware, and development issues. A special session for
    4 KB (560 words) - 23:10, 14 October 2008
  • in a distributed embedded system is quite important for the military, sub-areas of research: adaptation of system operations to the network
    5 KB (651 words) - 23:13, 14 October 2008
  • * Verification and validation of resilient systems * System structuring for resilience
    9 KB (1,264 words) - 18:14, 8 November 2008
  • # SOA-based system testing and maintenance * Industry System Experience and Report
    6 KB (733 words) - 12:48, 27 October 2016
  • ...ngoing and planned efforts towards this vision: CORDET, DOMENG, SOIS, AOCS system studies, ASSERT, spin-in from IMA and AUTOSAR etc... * AOCS system architecture studies
    18 KB (2,714 words) - 23:23, 14 October 2008
  • - Embedded System Architecture for Ubiquitous - Specification, Validation and Verification of Embedded System and Software
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = The Second IEE International Conference on Secure System Integration and Reliability Improvement # System integration for human computer interaction
    3 KB (337 words) - 23:20, 14 October 2008
  • ...UBICC journal is to publish the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in t Confidentiality, Data and system integrity
    4 KB (502 words) - 23:20, 14 October 2008
  • * System-in-package design * Electronic System Level Design
    2 KB (282 words) - 23:21, 14 October 2008
  • Any submission whose content is relevant to the area of resource constrained system design will be considered, but submission whose subject matter is related t * formal techniques for verification and validation of
    2 KB (254 words) - 23:22, 14 October 2008
  • * Computer and system architectures * Test and verification
    3 KB (377 words) - 23:24, 14 October 2008
  • * embedded system hardware/software co-design and co-verification * network and system on-a-chip and applications
    9 KB (1,181 words) - 00:37, 15 October 2008
  • * Test, Verification, and Reliability * System Packaging & Integration
    2 KB (228 words) - 23:24, 14 October 2008
  • * System-Level Design, Simulation, and Verification
    2 KB (275 words) - 23:24, 14 October 2008
  • * Computer and system architectures * Test and verification
    3 KB (391 words) - 23:24, 14 October 2008
  • In the last years, new system concepts have been promoted and partially embedded in new deployments. Anti ...eworks and system design methodologies supported by appropriate models and system specification languages, the deployment of application-oriented systems rai
    11 KB (1,492 words) - 23:26, 14 October 2008
  • - Model analysis, verification and validation. ...made electronically in PDF format via the ACM SAC online track management system at http://sac.cs.iupui.edu/SAC2009/
    6 KB (746 words) - 23:26, 14 October 2008
  • In the last years, new system concepts have been promoted and partially embedded in new deployments. Anti ...eworks and system design methodologies supported by appropriate models and system specification languages, the deployment of application-oriented systems rai
    6 KB (765 words) - 23:26, 14 October 2008
  • ...de dependable operation - in terms of reliability and availability - for a system made of unreliable components. ...echanisms such as clock- and Vdd-gating are increasing voltage droops; the verification manpower budget is becoming a significant part of the design effort; oxide
    5 KB (598 words) - 01:12, 31 May 2012
  • * Hardware and software testing, verification, and validation. * Dependability in high-bandwidth and system area networks.
    4 KB (528 words) - 23:27, 14 October 2008
  • * Design, simulation and analysis tools with experimental verification * System architecture
    2 KB (278 words) - 22:54, 4 February 2009
  • technologies that allows for the decomposition of a complex system individual components to achieve system functions collectively,
    6 KB (707 words) - 23:29, 14 October 2008
  • ...ry complex as they are responsible for controlling and regulating multiple system functionalities. Often embedded systems are also safety-critical requiring ...sors controlling the modern cars or aircrafts and airport baggage handling system that track and trace unsafe baggage. To address this growing need for safet
    4 KB (456 words) - 23:30, 14 October 2008
  • Hardware/Software Codesign and System Synthesis 2) VLSI and circuit techniques for embedded system design
    11 KB (1,352 words) - 00:33, 15 October 2008
  • research challenges are encountered in areas such as verification, system and compiler
    5 KB (673 words) - 23:30, 14 October 2008
  • improve efficiency in the use of system resources.... However, adaptability also incurs overhead in terms of system
    7 KB (851 words) - 23:30, 14 October 2008
  • certification, resulting in a major verification challenge. The notion of Cyber-Physical System (CPS) is adding new dimenions to these challenges.
    3 KB (426 words) - 23:30, 14 October 2008
  • achieving component interoperability and to predict global system * Verification & analysis of interfaces
    4 KB (537 words) - 23:30, 14 October 2008
  • number of controllers distributed over the entire system and embedded system design increase the engineering challenges and demand
    5 KB (655 words) - 23:30, 14 October 2008
  • ...ty. Of course, dependability and adaptiveness can not simply be added to a system like a plug-in module. Rather, for databases, services, middleware, and sof ...ions and formal methods (e.g., rigorous development of dependable systems, verification and refinement of fault tolerant systems, techniques and mechanisms ensurin
    8 KB (952 words) - 23:31, 14 October 2008
  • - Verification tools for ontologies The papers must be uploaded using the online system provided at the workshop website: http://waods.istase.fr/openconf/openconf.
    4 KB (523 words) - 23:31, 14 October 2008
  • ...ns, specification, design, verification, validation, testing, maintenance, system of systems, etc. System software: real-time kernels and operating systems, middleware support for O
    3 KB (377 words) - 23:31, 14 October 2008
  • |Title=International Conference on Computer Aided Verification * Algorithms and tools for system synthesis
    2 KB (291 words) - 11:09, 20 November 2020
  • ...ems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing. FMCAD 2008 will include a full day
    2 KB (269 words) - 23:36, 14 October 2008
  • ...nd Synthesis provides a forum for research in synthesis, optimization, and verification of integrated circuits and systems. The emphasis is on novelty and intellec * testing and verification;
    3 KB (399 words) - 23:36, 14 October 2008
  • ...onents with limited resources. Increases in software content introduce new system design issues. ...e tools, methods, and case studies for applications with specific embedded system content.
    2 KB (322 words) - 12:03, 27 November 2020
  • analysis, model-checking, verification, calculation, reusable * Role of formal methods: formal methods in hardware and system design,
    7 KB (979 words) - 23:37, 14 October 2008
  • A1. Airborne SAR System A2. Space-borne SAR System
    2 KB (307 words) - 23:39, 14 October 2008
  • ...ies, middleware, tools, and models for high assurance systems development, verification and validation, and assessment are welcome. * Integrated system reliability, availability, security, safety, and timing analysis and evalua
    6 KB (748 words) - 14:43, 27 December 2015
  • Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and de * SYSSEC: System security
    13 KB (1,617 words) - 19:03, 24 November 2008
  • and the methodologies and tools for the analysis and verification of system Language expressiveness, Logic, Verification, Quantum languages, Semantics,
    6 KB (823 words) - 14:28, 14 December 2008
  • .../ETCS (European Railway Traffic Management System / European Train Control System) projects. Since February 2007, he has worked on the protection of transpor
    1 KB (186 words) - 17:22, 5 February 2009
  • researchers interested in developing algorithms, verification methods of system demonstrations.
    4 KB (535 words) - 10:05, 24 December 2008
  • ** Verification development, verification, and implementation; (2) application papers,
    5 KB (680 words) - 23:55, 27 February 2020
  • ...n of AI with other technologies; development methodologies; validation and verification; lessons learned; social and other technology transition issues. ...may evaluate either a stand-alone application or a component of a complex system. In addition to the criteria listed above for the Emerging Track papers, th
    11 KB (1,724 words) - 12:55, 18 January 2009
  • o Software testing and verification o Embedded system testing and verification
    5 KB (567 words) - 12:58, 18 January 2009

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)