Filters








2,049 Hits in 13.0 sec

Methodologies for the WCET Analysis of Parallel Applications on Many-Core Architectures

Vincent Nelis, Patrick Meumeu Yomsi, Luis Miguel Pinho
2015 2015 Euromicro Conference on Digital System Design  
After discussing the pros and cons of all different methodologies for WCET analysis, we introduce a new approach that is developed within the P-SOCRATES project.  ...  After discussing the pros and cons of all different methodologies for WCET analysis, we introduce a new approach that is developed within the P-SOCRATES project.  ...  ACKNOWLEDGEMENTS This work was partially supported by National Funds through FCT/MEC (Portuguese Foundation for Science and Technology) and when applicable, co-financed by ERDF (  ... 
doi:10.1109/dsd.2015.105 dblp:conf/dsd/NelisYP15 fatcat:e3swrmvesnewzeranon3e7c7uy

Service-oriented design and development methodology

Michael P. Papazoglou, Willem-Jan Van Den Heuvel
2006 International Journal of Web Engineering and Technology  
Aim of this paper is to examine a service development methodology from the point of view of both service producers and requesters and review the range of elements in this methodology that are available  ...  This paper provides an overview of the methods and techniques used in service-oriented design and development.  ...  During this step the programming languages and models that are appropriate for implementing the new Web service are also determined. 2.  ... 
doi:10.1504/ijwet.2006.010423 fatcat:3pe3vd6korcxlmioe6rbiyzc6m

METHODOLOGICAL ISSUES IN THE STUDY OF DEVELOPMENT

A. Eugene Havens
1972 Sociologia Ruralis  
I do not view this process as a step-wise, static approach, but rather.an integrated process in which there is constant  ...  Some recent sociological approaches to the study of development are reviewed in this paper, and suggestions for clarification of the issues and approaches are made.  ...  The major implication for development analysis, and especially for the formulation of action programs, is that behavior can be changed at any time. 8.  ... 
doi:10.1111/j.1467-9523.1972.tb00142.x fatcat:nuvqhz36nzgt7lorvagj5blrre

Tool Support for Experience-Based Software Development Methodologies [chapter]

Scott Henninger
2003 Advances in Computers  
Techniques and tools are needed that help software practitioners apply past knowledge to current projects while engaging in knowledge creation processes.  ...  Experience-based approaches to software development promise to capture critical knowledge from software projects that can be used as a basis for continuous improvement of software development practices  ...  This research was funded by the National Science Foundation (CCR-9502461, CCR-9988540, ITR-0085788, and CCR-0204436).  ... 
doi:10.1016/s0065-2458(03)59002-7 fatcat:ayosnyjmwjbj7jscl46npbvt6i

A methodology to identify identical single-board computers based on hardware behavior fingerprinting [article]

Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez
2022 arXiv   pre-print
However, existing solutions are not suitable for single-board devices since they do not consider their hardware and software limitations, underestimate critical aspects such as fingerprint stability or  ...  To improve it, this work first identifies the essential properties for single-board device identification: uniqueness, stability, diversity, scalability, efficiency, robustness, and security.  ...  In this sense, no previous solution intends to design a solution for commercial-off-the-shelf (COTS) IoT devices, where devices already available in the market do not need any modification to be physically  ... 
arXiv:2106.08209v4 fatcat:b3hqetygs5h2vdfdpjmvb2cbca

Assessing and managing risks to information assurance: A methodological approach

Gregory A. Lamm, Yacov Y. Haimes
2002 Systems Engineering  
The division is testing new TTPs for a new tactical command post communications network and integration package.  ...  This chapter demonstrates the efficacy of the IA methodology by integrating a detailed description of each step in the methodology within a scenario-based example.  ...  These classes are modeled after the integrity levels for computer systems in German nuclear power plants.  ... 
doi:10.1002/sys.10030 fatcat:3cthjejvubexfbzjaht7q77kby

A comprehensive approach for the development of modular software architecture description languages

Eric M. Dashofy, André van der Hoek, Richard N. Taylor
2005 ACM Transactions on Software Engineering and Methodology  
This makes the effort in adapting an existing notation to a new purpose commensurate with developing a new notation from scratch.  ...  language modules and a process for integrating them, and insights about the roles of different kinds of tools in a modular ADL-based infrastructure.  ...  ACKNOWLEDGMENTS The authors would first like to acknowledge and thank the anonymous reviewers for their invaluable insights about this article which greatly assisted us in shaping and scoping this work  ... 
doi:10.1145/1061254.1061258 fatcat:d2m4qxrvhzb3jae4cba5j7rrry

A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints

Uchenna Daniel Ani, Jeremy McKendrick Watson, Madeline Carr, Al Cook, Jason RC Nurse
2020 The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology  
Some drivers for their use span are as follows: supported license types; programming languages; operating systems platforms; user interface types; documentation and communication types; citations; code  ...  This study contributes new insights from security and functionality characteristics metrics to underscore the use and effectiveness of open source simulators.  ...  Methodology This study followed a s systematic analysis process from data collection to analysis 20 comprising a two-phase approach as proposed by Webster and Watson, 21 which supports following rigorous  ... 
doi:10.1177/1548512920953499 fatcat:d47gxkzznveoplad3ssofo3k5i

Some Pertinent Issues And Considerations On Cbse

Anil Kumar Tripathi, Ratneshwer
2015 Zenodo  
CBSE must define and describe processes to assure timely completion of high quality software systems that are composed of a variety of pre built software components.  ...  Though these features provide distinct and visible benefits in software design and programming, they also raise some challenging problems.  ...  The limitations of traditional models demonstrate the need for a new approach to effort estimation in CBSD [55] .  ... 
doi:10.5281/zenodo.1100716 fatcat:jwpo7grhhrairdtsvv4l6333bu

Safety of computer control systems: challenges and results in software development

Janusz Zalewski, Wolfgang Ehrenberger, Francesca Saglietti, Janusz Górski, Andrew Kornecki
2003 Annual Reviews in Control  
Software diversity, off-the-shelf software, failure mode and effect analysis, rigorous and formal software development are discussed.  ...  This paper reviews some results in improving software safety in computer control systems.  ...  The disadvantage is that most of the traditional safety analysis techniques are rather informal.  ... 
doi:10.1016/s1367-5788(03)00004-x fatcat:mtuoxdn7vndrjikbugrlemt3ju

View-based maintenance of graphical user interfaces

Peng Li, Eric Wohlstadter
2008 Proceedings of the 7th international conference on Aspect-oriented software development - AOSD '08  
In this paper we investigate the combination of a hybrid dynamic and static approach to allow for view-based maintenance of GUIs.  ...  In this paper we are concerned specifically with the maintenance of graphical user interfaces (GUIs). User interface code can crosscut the decomposition of applications making GUIs hard to maintain.  ...  Therefore traditional compiler (intra-procedural) analysis is sufficient to make a conservative approximation.  ... 
doi:10.1145/1353482.1353501 dblp:conf/aosd/LiW08 fatcat:oeeq7dxbnzhazenirehd2yagzy

Sponsors and Supporters

2015 2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering  
Fan Yan for the helpfulness to English grammar. A special thank to Dr. Dong Yuan at Department of Computer Science and Technology, Tsinghua University for exchanging the viewpoints.  ...  This work has been supported by the IBM Toronto Center for Advanced Studies (CAS), the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Consortium for Software Engineering (  ...  However, tools by themselves are not sufficient; the tools must be used to effective. A proven technique to facilitate adoption is to ensure ease of integration.  ... 
doi:10.1109/mise.2015.7 fatcat:vroz3iskmbg4xp7kmxdm74wcjy

Sponsors and Supporters

2015 2015 IEEE/ACM 4th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering  
Fan Yan for the helpfulness to English grammar. A special thank to Dr. Dong Yuan at Department of Computer Science and Technology, Tsinghua University for exchanging the viewpoints.  ...  This work has been supported by the IBM Toronto Center for Advanced Studies (CAS), the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Consortium for Software Engineering (  ...  However, tools by themselves are not sufficient; the tools must be used to effective. A proven technique to facilitate adoption is to ensure ease of integration.  ... 
doi:10.1109/raise.2015.7 fatcat:l3ie5zayxjgs7oiv7eklxvjsvm

Sponsors and Supporters

2009 2009 Latin American Web Congress  
Fan Yan for the helpfulness to English grammar. A special thank to Dr. Dong Yuan at Department of Computer Science and Technology, Tsinghua University for exchanging the viewpoints.  ...  This work has been supported by the IBM Toronto Center for Advanced Studies (CAS), the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Consortium for Software Engineering (  ...  However, tools by themselves are not sufficient; the tools must be used to effective. A proven technique to facilitate adoption is to ensure ease of integration.  ... 
doi:10.1109/la-web.2009.9 fatcat:ty2ax6u265er3e6ywlpumfmhn4

Sponsors and supporters

2012 37th Annual IEEE Conference on Local Computer Networks -- Workshops  
Fan Yan for the helpfulness to English grammar. A special thank to Dr. Dong Yuan at Department of Computer Science and Technology, Tsinghua University for exchanging the viewpoints.  ...  This work has been supported by the IBM Toronto Center for Advanced Studies (CAS), the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Consortium for Software Engineering (  ...  However, tools by themselves are not sufficient; the tools must be used to effective. A proven technique to facilitate adoption is to ensure ease of integration.  ... 
doi:10.1109/lcnw.2012.6424095 fatcat:6hmlm7fyyzdkzfgqyknysslwri
« Previous Showing results 1 — 15 out of 2,049 results