Search results

Jump to: navigation, search
  • ...nt of view, there are open issues at many levels. Among the others, at the system design level, both traditional approaches based on UML and approaches takin ...ast years, and many attempts at using formal methods for specification and verification in this setting have been made. Session correlation, service types, contrac
    7 KB (957 words) - 15:15, 11 August 2008
  • During the last couple of years, several approaches for system verification, development and evolution methodology. This
    9 KB (1,151 words) - 18:27, 13 October 2008
  • hardly fully capture during the system development. User requirements of requirements in a progressive manner by starting from system-level
    4 KB (471 words) - 23:33, 13 August 2008
  • ...ities include but are not limited to formal methods, software and hardware verification, static analysis, programming languages, software engineering, real-time sy * Specification and verification techniques for finite and infinite-state systems;
    4 KB (543 words) - 16:39, 16 July 2020
  • Programming and system engineering: ORC paradigms, object/component specification, design, verification, validation, testing, maintenance,
    5 KB (715 words) - 17:43, 11 September 2008
  • for design, development, testing, analysis, and verification of correct Submissions should be uploaded at EasyChair Conference system:
    5 KB (614 words) - 17:22, 11 September 2008
  • (architecture/system-oriented), (iii) methodologies/languages properties (like cooperation, coordination etc...), agent verification
    10 KB (1,371 words) - 16:14, 12 November 2020
  • |Field=Software Verification software verification. The Working Conference is open to anyone who is
    5 KB (686 words) - 12:27, 12 September 2008
  • ...levels, formal, semi-formal, and specification-driven verification on the system level. Transaction-level modeling. * 2. Design and verification methods for composition of concurrent systems: Multi-core architectures, ne
    5 KB (708 words) - 18:23, 13 October 2008
  • ...tworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in p ...dels, negotiation, cooperation, competition, self-organization, emergence, verification etc.
    9 KB (1,216 words) - 17:32, 14 October 2008
  • .System on Chip (SoC) and Multicore systems .Hardware/Software Co-Verification
    3 KB (375 words) - 17:48, 14 October 2008
  • ...hitecture: Novel logic block architectures, combination of FPGA fabric and system blocks (DSP, processors, memories, etc.), design of routing fabric, I/O int ...chnology mapping, system-level partitioning, logic generators, testing and verification, CAD for FPGA-based accelerators, CAD for incremental FPGA design and on-li
    4 KB (561 words) - 17:48, 14 October 2008
  • Verification and validation (including model checking) of dependable software architectu .... All received papers will be acknowledged via the an automated submission system.
    7 KB (960 words) - 17:48, 14 October 2008
  • ...sign, logic and behavioral synthesis, logic mapping, simulation and formal verification, layout (partitioning, placement, routing, floorplanning, compaction), algo and the classification system detailed at: http://www.acm.org/class/1998/
    4 KB (459 words) - 21:03, 14 October 2008
  • ...lgorithms for: analytic modeling, system measurement and monitoring, model verification and validation, simulation, statistical analysis, experimental design, and
    3 KB (361 words) - 21:16, 14 October 2008
  • - Reliability: verification and validation; model checking; = and business models; large-scale system integration; legal, economic
    9 KB (1,193 words) - 22:53, 14 October 2008
  • �?� Cooperative design analysis, verification, integration and interoperability, standards �?� System architecture, prototypes, user interfaces for CV: web applications, textual
    4 KB (468 words) - 22:54, 14 October 2008
  • - automata for system analysis and programme verification
    6 KB (788 words) - 23:01, 14 October 2008
  • - Program and system verification
    5 KB (799 words) - 21:49, 26 February 2020
  • Petri nets (system design/verification with nets, protocols and networks) Time series and system modeling
    5 KB (634 words) - 23:05, 14 October 2008
  • exploitation of theory through methods and tools for system * software specification, refinement, verification and testing
    8 KB (1,085 words) - 18:01, 12 February 2009
  • - automata for system analysis and programme verification
    7 KB (994 words) - 23:06, 14 October 2008
  • * Reasoning over MOF-based models using ontologies: verification and * Ontology connectors to system models: methods and techniques for
    8 KB (994 words) - 23:09, 14 October 2008
  • ...ications often require the creation of a collaborative workflow management system as part of their sophisticated problem solving processes so that e-scientis · Workflow verification and validation in grid environments
    7 KB (886 words) - 23:10, 14 October 2008
  • ...ng the management of experiment routines, a scientific workflow management system hides the underlying integration details of the e-Science resources and all ...tions were organized as three sessions: scientific workflows applications, system architecture and middleware, and development issues. A special session for
    4 KB (560 words) - 23:10, 14 October 2008
  • in a distributed embedded system is quite important for the military, sub-areas of research: adaptation of system operations to the network
    5 KB (651 words) - 23:13, 14 October 2008
  • * Verification and validation of resilient systems * System structuring for resilience
    9 KB (1,264 words) - 18:14, 8 November 2008
  • # SOA-based system testing and maintenance * Industry System Experience and Report
    6 KB (733 words) - 12:48, 27 October 2016
  • ...ngoing and planned efforts towards this vision: CORDET, DOMENG, SOIS, AOCS system studies, ASSERT, spin-in from IMA and AUTOSAR etc... * AOCS system architecture studies
    18 KB (2,714 words) - 23:23, 14 October 2008
  • - Embedded System Architecture for Ubiquitous - Specification, Validation and Verification of Embedded System and Software
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = The Second IEE International Conference on Secure System Integration and Reliability Improvement # System integration for human computer interaction
    3 KB (337 words) - 23:20, 14 October 2008
  • ...UBICC journal is to publish the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in t Confidentiality, Data and system integrity
    4 KB (502 words) - 23:20, 14 October 2008
  • * System-in-package design * Electronic System Level Design
    2 KB (282 words) - 23:21, 14 October 2008
  • Any submission whose content is relevant to the area of resource constrained system design will be considered, but submission whose subject matter is related t * formal techniques for verification and validation of
    2 KB (254 words) - 23:22, 14 October 2008
  • * Computer and system architectures * Test and verification
    3 KB (377 words) - 23:24, 14 October 2008
  • * embedded system hardware/software co-design and co-verification * network and system on-a-chip and applications
    9 KB (1,181 words) - 00:37, 15 October 2008
  • * Test, Verification, and Reliability * System Packaging & Integration
    2 KB (228 words) - 23:24, 14 October 2008
  • * System-Level Design, Simulation, and Verification
    2 KB (275 words) - 23:24, 14 October 2008
  • * Computer and system architectures * Test and verification
    3 KB (391 words) - 23:24, 14 October 2008
  • In the last years, new system concepts have been promoted and partially embedded in new deployments. Anti ...eworks and system design methodologies supported by appropriate models and system specification languages, the deployment of application-oriented systems rai
    11 KB (1,492 words) - 23:26, 14 October 2008
  • - Model analysis, verification and validation. ...made electronically in PDF format via the ACM SAC online track management system at http://sac.cs.iupui.edu/SAC2009/
    6 KB (746 words) - 23:26, 14 October 2008
  • In the last years, new system concepts have been promoted and partially embedded in new deployments. Anti ...eworks and system design methodologies supported by appropriate models and system specification languages, the deployment of application-oriented systems rai
    6 KB (765 words) - 23:26, 14 October 2008
  • ...de dependable operation - in terms of reliability and availability - for a system made of unreliable components. ...echanisms such as clock- and Vdd-gating are increasing voltage droops; the verification manpower budget is becoming a significant part of the design effort; oxide
    5 KB (598 words) - 01:12, 31 May 2012
  • * Hardware and software testing, verification, and validation. * Dependability in high-bandwidth and system area networks.
    4 KB (528 words) - 23:27, 14 October 2008
  • * Design, simulation and analysis tools with experimental verification * System architecture
    2 KB (278 words) - 22:54, 4 February 2009
  • technologies that allows for the decomposition of a complex system individual components to achieve system functions collectively,
    6 KB (707 words) - 23:29, 14 October 2008
  • ...ry complex as they are responsible for controlling and regulating multiple system functionalities. Often embedded systems are also safety-critical requiring ...sors controlling the modern cars or aircrafts and airport baggage handling system that track and trace unsafe baggage. To address this growing need for safet
    4 KB (456 words) - 23:30, 14 October 2008
  • Hardware/Software Codesign and System Synthesis 2) VLSI and circuit techniques for embedded system design
    11 KB (1,352 words) - 00:33, 15 October 2008
  • research challenges are encountered in areas such as verification, system and compiler
    5 KB (673 words) - 23:30, 14 October 2008
  • improve efficiency in the use of system resources.... However, adaptability also incurs overhead in terms of system
    7 KB (851 words) - 23:30, 14 October 2008
  • certification, resulting in a major verification challenge. The notion of Cyber-Physical System (CPS) is adding new dimenions to these challenges.
    3 KB (426 words) - 23:30, 14 October 2008
  • achieving component interoperability and to predict global system * Verification & analysis of interfaces
    4 KB (537 words) - 23:30, 14 October 2008
  • number of controllers distributed over the entire system and embedded system design increase the engineering challenges and demand
    5 KB (655 words) - 23:30, 14 October 2008
  • ...ty. Of course, dependability and adaptiveness can not simply be added to a system like a plug-in module. Rather, for databases, services, middleware, and sof ...ions and formal methods (e.g., rigorous development of dependable systems, verification and refinement of fault tolerant systems, techniques and mechanisms ensurin
    8 KB (952 words) - 23:31, 14 October 2008
  • - Verification tools for ontologies The papers must be uploaded using the online system provided at the workshop website: http://waods.istase.fr/openconf/openconf.
    4 KB (523 words) - 23:31, 14 October 2008
  • ...ns, specification, design, verification, validation, testing, maintenance, system of systems, etc. System software: real-time kernels and operating systems, middleware support for O
    3 KB (377 words) - 23:31, 14 October 2008
  • |Title=International Conference on Computer Aided Verification * Algorithms and tools for system synthesis
    2 KB (291 words) - 11:09, 20 November 2020
  • ...ems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing. FMCAD 2008 will include a full day
    2 KB (269 words) - 23:36, 14 October 2008
  • ...nd Synthesis provides a forum for research in synthesis, optimization, and verification of integrated circuits and systems. The emphasis is on novelty and intellec * testing and verification;
    3 KB (399 words) - 23:36, 14 October 2008
  • ...onents with limited resources. Increases in software content introduce new system design issues. ...e tools, methods, and case studies for applications with specific embedded system content.
    2 KB (322 words) - 12:03, 27 November 2020
  • analysis, model-checking, verification, calculation, reusable * Role of formal methods: formal methods in hardware and system design,
    7 KB (979 words) - 23:37, 14 October 2008
  • A1. Airborne SAR System A2. Space-borne SAR System
    2 KB (307 words) - 23:39, 14 October 2008
  • ...ies, middleware, tools, and models for high assurance systems development, verification and validation, and assessment are welcome. * Integrated system reliability, availability, security, safety, and timing analysis and evalua
    6 KB (748 words) - 14:43, 27 December 2015
  • Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and de * SYSSEC: System security
    13 KB (1,617 words) - 19:03, 24 November 2008
  • and the methodologies and tools for the analysis and verification of system Language expressiveness, Logic, Verification, Quantum languages, Semantics,
    6 KB (823 words) - 14:28, 14 December 2008
  • .../ETCS (European Railway Traffic Management System / European Train Control System) projects. Since February 2007, he has worked on the protection of transpor
    1 KB (186 words) - 17:22, 5 February 2009
  • researchers interested in developing algorithms, verification methods of system demonstrations.
    4 KB (535 words) - 10:05, 24 December 2008
  • ** Verification development, verification, and implementation; (2) application papers,
    5 KB (680 words) - 23:55, 27 February 2020
  • ...n of AI with other technologies; development methodologies; validation and verification; lessons learned; social and other technology transition issues. ...may evaluate either a stand-alone application or a component of a complex system. In addition to the criteria listed above for the Emerging Track papers, th
    11 KB (1,724 words) - 12:55, 18 January 2009
  • o Software testing and verification o Embedded system testing and verification
    5 KB (567 words) - 12:58, 18 January 2009
  • ...dded Systems; Real-Time Issues; Models of Embedded Computation; Design and Verification Languages; Operating Systems and Quasi-Static Scheduling; Timing and Perfor System-on-Chip and Network-on-Chip Design & Testing: Design of Application- Specif
    3 KB (337 words) - 12:59, 18 January 2009
  • implementation of the essential concepts used in multi-agent system - Formal methods for specification and verification of MAS
    8 KB (977 words) - 12:59, 18 January 2009
  • Scientific Workflows and is currently based on the Ptolemy II system * Model verification
    3 KB (335 words) - 00:52, 2 February 2009
  • | Title = 4th International Workshop on Systems Software Verification Industrial-strength software analysis and verification has advanced in
    2 KB (255 words) - 13:00, 18 January 2009
  • implementation of the essential concepts used in multi-agent system - Formal methods for specification and verification of MAS
    7 KB (917 words) - 13:02, 18 January 2009
  • - Petri nets (system design/verification with nets, protocols and networks) - Time series and system modeling
    5 KB (661 words) - 13:02, 18 January 2009
  • program development and verification, artificial intelligence, knowledge files via the EasyChair system:
    5 KB (669 words) - 13:03, 18 January 2009
  • * audition * neural system models ...logical (T) work [Example: first choice: vision (T); second choice: neural system models (B)].
    8 KB (1,092 words) - 13:33, 18 January 2009
  • ...tware development, component based software engineering, software quality, verification and validation techniques and software project management,.
    1 KB (190 words) - 22:09, 27 February 2009
  • ...tware development, component based software engineering, software quality, verification and validation techniques and software project management.
    2 KB (284 words) - 22:10, 27 February 2009
  • ...the convergence of embedded system, real-time computing and communication system technologies and paradigms. The journal brings together researchers and sci ...rocess as well as to the design of hardware and software components of the system: despite the small size and reliance on battery power, the devices need to
    5 KB (646 words) - 17:06, 27 February 2009
  • - Natural language applications, tools and resources, system evaluation Network System Engineering
    6 KB (654 words) - 17:06, 27 February 2009
  • * Inter-provider trust and verification schemes * VoIP and IMS system performance, reliability and scalability
    4 KB (621 words) - 17:06, 27 February 2009
  • well into today’s distributed, heterogeneous Web-based system environments. * Verification and validation of interchanged rule bases in
    7 KB (883 words) - 17:06, 27 February 2009
  • • Knowledge-based system applications • Software agents for intelligent control system
    3 KB (319 words) - 17:07, 27 February 2009
  • ...ve Comparisons between Originals and their Simulations, Simulation of User-System Interaction. Simulating SLAM (Simultaneous Localisation and Mapping) in rob Systems research, Operating systems, File System, Storage.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • * Validation and verification ...s your PC. Less money than a linear system, More controlable than a linear system, Less space than an editing appliance like a casablanca, and upgradeable. W
    11 KB (1,563 words) - 06:56, 12 April 2012
  • drive the need for continuous innovation and expansion. As a result, these system/ consequence, testing and tuning these system/applications is becoming
    6 KB (817 words) - 17:08, 27 February 2009
  • We solicit papers in all areas related to characterization of computing system * Characterization of system behavior, including
    4 KB (589 words) - 17:08, 27 February 2009
  • aware system design will be considered, but submission - formal techniques for verification and validation of component =20
    4 KB (504 words) - 16:43, 27 December 2015
  • ...ormance visualization tools, statistical analysis resources, and debug and verification infrastructure.
    2 KB (210 words) - 12:17, 7 April 2016
  • ...hitecture: Novel logic block architectures, combination of FPGA fabric and system blocks (DSP, processors, memories, etc.), design of routing fabric, I/O int ...chnology mapping, system-level partitioning, logic generators, testing and verification, CAD for FPGA-based accelerators, CAD for incremental FPGA design and on-li
    5 KB (632 words) - 11:32, 2 August 2009
  • ...ems engineering, including the issues and complexities of system-level and system-of-systems applications, focusing on the total systems effectiveness of com ...eeks to create an interactive forum for the advancement of the practice of system design, development, and management, across the multiple disciplines and sp
    6 KB (706 words) - 11:33, 2 August 2009
  • Evaluation, Verification, Validation and Refinement of Intelligent systems, have been an important i ...need to be considered as early as possible during the Design phase of the system.
    6 KB (864 words) - 11:33, 2 August 2009
  • verification and validation, code generation, test-driven development, * validation, verification, and testing,
    6 KB (870 words) - 11:34, 2 August 2009
  • * Health Informatics System Development * Software Verification and Validation
    8 KB (1,112 words) - 11:35, 2 August 2009
  • - Verification of logistics services Please, submit papers (in PDF format) via our electronic submission system which is available at http://www.easychair.org/conferences/?conf=soclog2009
    12 KB (1,624 words) - 11:36, 2 August 2009
  • System Design Methods, Algorithm and Tools • System Level Specification and Modeling
    5 KB (605 words) - 15:11, 27 December 2015
  • ...aluation in Internet; System measurement and monitoring; Performance model verification and validation; Stochastic modeling (queues, Petri nets, etc.); Statistical ...ms security; Language-based security; Formalisms for security and protocol verification; Performance on firewall protected real-time systems; Security management i
    14 KB (1,651 words) - 15:56, 15 February 2017
  • * Petri nets (system design/verification with nets, protocols and networks) * Time series and system modeling
    4 KB (475 words) - 13:42, 26 February 2010
  • * System design and verification
    5 KB (607 words) - 18:01, 3 December 2009
  • * › Mobile System Security * › Security Verification and Validation
    4 KB (409 words) - 15:40, 5 February 2010
  • * specification and verification techniques; * software and hardware verification;
    3 KB (369 words) - 06:23, 4 August 2020
  • ABD TA: Assertion Based Design, Verification & Debug emphasis on frontier design levels, verification, automatic synthesis and
    8 KB (1,113 words) - 17:01, 22 February 2010
  • ...vantage, knowledge base and access to innovative emerging solutions in the system design domain. ...tion of member partners originating in the entire System Design ecosystem: system companies (aerospace, automotive, telecom, consumer, networking, …), embe
    3 KB (394 words) - 17:18, 22 February 2010
  • ...ons a system takes are not (completely) determined by the interactions the system is involved in? In computer science, nondeterministic interactions are usua * test and verification of interactive systems
    5 KB (604 words) - 21:24, 1 November 2010
  • * Formal methods for distributed computing: verification, synthesis and testing * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • <li>Memory system correctness, design, and analysis <br> <li>Program analysis, synthesis, and verification<br>
    2 KB (279 words) - 02:50, 22 October 2011
  • * Design & Verification Tools for Embedded Systems * Biomechatronic System Modeling, Simulation of Bio-Systems, System
    12 KB (1,378 words) - 21:13, 28 November 2010
  • ...ptation. SAA features become essential in the emerging and future embedded system, as the number of components and their heterogeneity increase significantly * Formal Methods in the Design and Verification of SAA Systems
    4 KB (598 words) - 18:55, 23 December 2010
  • ...uring the design of the system can be delayed until operation and thus the system is able to react more * Cyber Physical System
    8 KB (678 words) - 09:03, 2 January 2011
  • ...ptation. SAA features become essential in the emerging and future embedded system, as the number of components and their heterogeneity increase significantly * Formal Methods in the Design and Verification of SAA Systems
    4 KB (593 words) - 17:49, 7 January 2011
  • |Title=7th International Workshop on Automated Specification and Verification of Web Systems Automated Specification and Verification of Web Systems
    5 KB (650 words) - 14:16, 22 February 2011
  • * System Area Networks (SAN)/Clusters * Dependable Wide, Local, and System Area Networks
    3 KB (322 words) - 05:59, 8 March 2011
  • |Field=Computer system, Computer networks, Cyber security Verification and enforcement of security properties
    4 KB (581 words) - 18:48, 24 February 2020
  • ...scope of OPODIS, including theory, specification, design, performance, and system building. With strong roots in the theory of distributed systems. *Programming languages, formal methods, specification and verification applied to distributed systems
    2 KB (299 words) - 11:51, 8 April 2020
  • * E-government System * Knowledge-based System
    3 KB (408 words) - 11:39, 5 January 2013
  • ..., open source software development, software process, software testing and verification, embedded systems, distributed data management, information integration, do
    3 KB (422 words) - 12:09, 24 April 2016
  • |Field=system verification, software engineering, formal methods, software testing
    418 bytes (51 words) - 16:21, 8 July 2016
  • ...Treaty (CTBT)'''. Such interaction helps ensure that the Treaty’s global verification regime remains at the forefront of scientific and technical innovation. ...phere, underwater and underground. The CTBTO is tasked with establishing a verification regime which includes a global network of over 300 monitoring stations.
    3 KB (451 words) - 17:30, 24 January 2017
  • * Validation, Verification and Testing for Software Security Authors are invited to submit papers through theConference Submission System
    4 KB (562 words) - 12:05, 3 September 2017
  • Engineering, Computer Science and System, System Model and Algorithm, Management Verification and Validation
    5 KB (673 words) - 09:53, 3 September 2017
  • * Hardware Formal Verification System [http://wireilla.com/paper_submission/index.php]. Submissions must be
    3 KB (464 words) - 13:28, 28 July 2017
  • theory, specification, design, performance, and system building. - Programming languages, formal methods, specification and verification
    7 KB (1,009 words) - 15:54, 3 September 2019
  • submitted via EasyChair system. SoICT 2017 proceedings will be published in the Verification, Programming Languages; Parallel/Distributed Computing,
    4 KB (559 words) - 11:58, 8 August 2017
  • - System Modeling and Simulation - System Verification and Validation
    8 KB (1,150 words) - 10:11, 7 August 2019
  • Join us for Free Workshop on RTL Design & Functional Verification and receive Verification.
    2 KB (327 words) - 13:34, 28 July 2017
  • engines; applications, especially in systems analysis and formal verification; using the easychair submission system:
    5 KB (670 words) - 13:24, 28 July 2017
  • * High-Performance I/O Systems and Storage System Architectures * Dependable and Fault Tolerant System Designs
    1 KB (178 words) - 10:05, 20 November 2020
  • of smart systems (smart city, intelligence transportation system, smart healthcare system, etc.) and smart devices, such as smartphones, unmanned
    4 KB (500 words) - 09:56, 21 August 2017
  • reasoning process, so it can deal with multivariable and nonlinear system soft computing in system and application domains. The general scope of this
    4 KB (598 words) - 09:58, 21 August 2017
  • - System Design and Architecture - Tenant Application Development including Customization, Verification,
    8 KB (1,170 words) - 13:40, 3 September 2017
  • - Formal methods, models, simulation, and verification - System architectures for service composition
    4 KB (565 words) - 18:34, 4 July 2020
  • *Formal Verification of Biological Systems From Offline towards Real-Time: a Wearable HAR System Using Biosensors Integrated into a Knee Bandage (BIOSTEC)
    3 KB (359 words) - 12:32, 8 December 2020
  • * Development, verification and assessment of intelligent and autonomous safety-critical systems * Formal modelling, verification and validation
    5 KB (617 words) - 11:54, 19 June 2020
  • ...ed with the 18th International Conference on Application of Concurrency to System Design (ACSD 2018). * ● Model checking and verification of distributed systems
    2 KB (243 words) - 20:03, 13 May 2020
  • * Model checking and verification of distributed systems * Verification of infinite-state or parametric systems
    2 KB (251 words) - 18:19, 13 May 2020
  • * Model checking and verification of distributed systems * Verification of infinite-state or parametric systems
    2 KB (291 words) - 19:33, 13 May 2020
  • * development, verification and assessment of highly automated and autonomous dependable systems * formal modelling, verification and validation of critical systems, software and hardware
    3 KB (419 words) - 10:51, 19 June 2020
  • ...ys in the programme will focus on two areas bringing new challenges to the system design community: ...fields. The tutorials are well suited for researchers, tool developers and system designers.
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * System Specification and Modelling * System Design, Synthesis and Optimization
    4 KB (508 words) - 17:54, 6 January 2021
  • ...of FPGAs. Novel design software for system-level partitioning, debug, and verification. Algorithms for modeling, analysis and optimization of timing and power. ...c languages, tools, and techniques to facilitate the design, debugging and verification of FPGA-based applications and systems. Novel hardware/software co-design a
    11 KB (1,541 words) - 15:35, 18 June 2020
  • * 1. System-Level Modeling and Design Methodology: * 1.1. HW/SW co-design, co-simulation and co-verification
    6 KB (739 words) - 15:08, 13 May 2020
  • ...A Component-level Analysis of an Academic Search Test Collection. Part I: System and Collection Configurations ...tha and Efstathios Stamatatos: An Improved Impostors Method for Authorship Verification
    5 KB (723 words) - 08:29, 27 May 2020
  • ...aluation in Internet; System measurement and monitoring; Performance model verification and validation; Stochastic modeling (queues, Petri nets, etc.); Statistical ...ms security; Language-based security; Formalisms for security and protocol verification; Performance on firewall protected real-time systems; Security management i
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...f RFID systems; Localization and tracking; Inventory tracking; Testing and verification; Planing and executing RFID systems; RFID pilot projects; Use cases in depl PESYS: Pervasive education system
    13 KB (1,636 words) - 11:51, 10 July 2020
  • ...voice, and skin biometrics; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authenti ...lti-agent planning and cooperation; Logics and formal models of for agency verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy and security is
    18 KB (2,036 words) - 02:36, 10 July 2020
  • A5 SAR System Simulation and Modeling B5 Calibration and Verification
    2 KB (323 words) - 11:18, 10 July 2020
  • ...tterns, UML, etc.); Software process and workflow; Software validation and verification; Software testing and testing tools; Software implementation; Software proj ...on, testing reviews and repair techniques; Accessibility across the entire system lifecycle; Accessibility within e-organizations: good practices and experie
    13 KB (1,573 words) - 12:00, 10 July 2020
  • |Title=The Twelfth International Conference on Advances in System Simulation SIMUL 2020, The Twelfth International Conference on Advances in System Simulation
    12 KB (1,421 words) - 12:02, 10 July 2020
  • ...tection in eTechnologies; Secure virtualized environments; Security during system migration or updates; Security integration pitfalls; Data leakage, vulnerab Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and de
    15 KB (1,886 words) - 16:16, 25 August 2020
  • * specification and verification techniques; * software and hardware verification;
    2 KB (293 words) - 14:54, 3 August 2020
  • * Cyber-physical system security * Operating system security
    4 KB (436 words) - 12:06, 25 August 2020
  • System robustness; Systems scalability; Fault-tolerant systems; Feedback System-of-systems; Systems ergonomics; Subsystem interactions; Systems
    10 KB (1,210 words) - 20:17, 22 November 2020
  • architectures; Multi-processor system on chip interfaces; Interoperable Generalizing agile specialists; System integration in agile structures;
    12 KB (1,505 words) - 20:38, 22 November 2020
  • ...aluation in Internet; System measurement and monitoring; Performance model verification and validation; Stochastic modeling (queues, Petri nets, etc.); Statistica ...ms security; Language-based security; Formalisms for security and protocol verification; Performance on firewall protected real-time systems; Security management i
    17 KB (2,035 words) - 14:45, 18 February 2021
  • analysis; Signal and system modeling; Cyclostationary signal analysis; validation and verification mechanisms; Efficient data integration and
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Fundamentals on system safety; Robustness technology and evaluation; Safety-oriented system design; Performance metrics and dependable
    9 KB (1,079 words) - 11:12, 9 December 2020
  • *Verification & Validation approaches ...hnical Program Committee. Drafts are submitted through the EDAS Submission System.
    6 KB (804 words) - 11:42, 28 January 2021
  • File, storage, and non-volatile memory system Verification, validation, and testing
    2 KB (273 words) - 04:32, 17 March 2021
  • ...timation; Array signal processing; Statistical signal analysis; Signal and system modeling; Cyclostationary signal analysis; Active noise control, active noi ...tworking for homeland security; Real-time intelligence data validation and verification mechanisms; Efficient data integration and mining techniques for NATO count
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...Metrics for risk assessment; Performance-oriented design; Safety-oriented system design; Performance metrics and dependable metrics; Active and passive safe ...Evaluation of safety data, and mitigation and prevention strategies; Model verification and validation; Fault-tolerant systems; Simulation, statistical analysis, a
    9 KB (1,086 words) - 02:44, 26 November 2021
  • ...tems; Centralized and distributed systems; Proactive and reactive systems; System robustness; Systems scalability; Fault-tolerant systems; Feedback systems; Systems requirements; Systems modeling; Systems development lifecycle; System-of-systems; Systems ergonomics; Subsystem interactions; Systems decompositi
    10 KB (1,228 words) - 02:46, 26 November 2021
  • ...gurable and parametrized abstract interface architectures; Multi-processor system on chip interfaces; Interoperable hardware/software interfaces; Interface-b ...nization structure; Agile teams and roles; Generalizing agile specialists; System integration in agile structures; Agile analysis and design; Scalable agile
    13 KB (1,522 words) - 03:32, 3 December 2021