• Aucun résultat trouvé

[PDF] Top 20 Safe and secure model-driven design for embedded systems

Has 10000 "Safe and secure model-driven design for embedded systems" found on our website. Below are the top 20 most common "Safe and secure model-driven design for embedded systems".

Safe and secure model-driven design for embedded systems

Safe and secure model-driven design for embedded systems

... of embedded systems, designers often rely on system design ...important and hardest task of designing software systems is sometimes considered to be determining the requirements of the ... Voir le document complet

214

Model-Driven Engineering for Design-Runtime Interaction in Complex Systems: Scientific Challenges and Roadmap

Model-Driven Engineering for Design-Runtime Interaction in Complex Systems: Scientific Challenges and Roadmap

... al. for modern practices, such as Model-Driven Engineering (MDE), to tackle advan- ces in productivity and quality of these now Cyber-Physical Systems (CPSs) ...up for real-life ... Voir le document complet

9

Model-Driven Engineering for Design-Runtime Interaction in Complex Systems: Scientific Challenges and Roadmap

Model-Driven Engineering for Design-Runtime Interaction in Complex Systems: Scientific Challenges and Roadmap

... Complex systems are now predominant in several domains such as automo- tive, health-care, aerospace, industrial control and automation [ 2 ...call for modern practices, such as ... Voir le document complet

9

Model-Driven Performance Evaluation and Formal Verification for Multi-level Embedded System Design

Model-Driven Performance Evaluation and Formal Verification for Multi-level Embedded System Design

... a model checker for networks of timed au- tomata, the behavioral model of a system to be ver- ified is first translated into a UPPAAL specification to be checked for desired ...behavior. ... Voir le document complet

13

Model-Driven Engineering for Trusted Embedded Systems based on Security and Dependability Patterns

Model-Driven Engineering for Trusted Embedded Systems based on Security and Dependability Patterns

... Define needs in terms of properties and/or keywords, Search for patterns in the repository, Select the appropriate pattern from those proposed by the repository, Import the selection int[r] ... Voir le document complet

21

Model-Driven Engineering for Trusted Embedded Systems based on Security and Dependability Patterns

Model-Driven Engineering for Trusted Embedded Systems based on Security and Dependability Patterns

... Define needs in terms of properties and/or keywords, Search for patterns in the repository, Select the appropriate pattern from those proposed by the repository, Import the selection int[r] ... Voir le document complet

20

A model-driven approach for embedded system prototyping and design

A model-driven approach for embedded system prototyping and design

... ONCLUSION AND F UTURE W ORKS In this paper we present the hHOEi 2 process and its formal- ization ...activities and tasks with clear inputs and ...concepts for project characterization ... Voir le document complet

8

Deep Model Compression and Architecture Optimization for Embedded Systems: A Survey

Deep Model Compression and Architecture Optimization for Embedded Systems: A Survey

... automatically design topologies that will compete with each ...structures and missing information (see Figure ...conventions for fixed or constrained topologies such as non-redundant genetic encoding ... Voir le document complet

26

A framework for the conceptual and preliminary design of embedded mechatronic systems

A framework for the conceptual and preliminary design of embedded mechatronic systems

... scenarios for the concerned ...requirements and system architecture drive the system and components ...preliminary design fast, reusable and optimal [5]. For representing ... Voir le document complet

11

Model-Based Methodology for Requirements Traceability in Embedded Systems

Model-Based Methodology for Requirements Traceability in Embedded Systems

... sensors, and a controller which acquire the noise through the sensors, and computes the correction during the combustion phases of the ...the design of the corresponding ...system for gasoline ... Voir le document complet

11

Assisting the Design of Secured Applications for Embedded Systems

Assisting the Design of Secured Applications for Embedded Systems

... components and their interactions are depicted in figure ...analyses and refinements were ...SW and HW ...signatures and MAC verification. Thus, the HSM stores and handles secret ... Voir le document complet

187

A model for requirements traceability in an heterogeneous model-based design process. Application to automotive embedded systems

A model for requirements traceability in an heterogeneous model-based design process. Application to automotive embedded systems

... requirement model (RM) is a model-view of the initial requirements resulting from a re- quirement engineering ...essential for designers because the needs become easily understandable, adapted ... Voir le document complet

20

Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management

Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management

... metro and railway ...specifications and required properties by final soft- ...demanding and binding unlike model checking, for example, which off ers automatic tools and can be ... Voir le document complet

17

Integrated Model-checking for the Design of Safe and Efficient Distributed Software Commissioning

Integrated Model-checking for the Design of Safe and Efficient Distributed Software Commissioning

... useful and applicable to Aeolus. However, Aeo- lus and its satellites [11] are not maintained and were not equipped with such integrated model ...using model checking to help in the ... Voir le document complet

19

A Methodology for Improving Software Design Lifecycle in Embedded Control Systems

A Methodology for Improving Software Design Lifecycle in Embedded Control Systems

... (used for the control design) and the SynDEx 2 distributed implementation CAD ...laws and the continuous plant model are described using a data-flow ...SynDEx model [3, ... Voir le document complet

5

Architecture-Driven Semantic Analysis of Embedded Systems (Eds) Dagstuhl Seminar 12272

Architecture-Driven Semantic Analysis of Embedded Systems (Eds) Dagstuhl Seminar 12272

... language and using it for building tools that generate analytical models from architectural ones, as well as generate code and configuration scripts for the ...models for analytical ... Voir le document complet

5

Safe Model Polymorphism for Flexible Modeling

Safe Model Polymorphism for Flexible Modeling

... used for the object-oriented analysis and design of software systems ...the Model Development Tools 4 sub-project (MDT) provides an EMF-based implementation of the UML2 specification, ... Voir le document complet

37

A Process Model Driven Approach Applied in TOPCASED for Embedded Real-Time Software

A Process Model Driven Approach Applied in TOPCASED for Embedded Real-Time Software

... holds for the architects of the biggest towers which exist in the world ...one and, in particular the F ALCON 7X 3 which is the up-market executive jet of the Dassault Aviation ... Voir le document complet

11

A model-driven framework development methodology for robotic systems

A model-driven framework development methodology for robotic systems

... Properties and Quality of Ser- vice Non-functional properties dene how a functionality operates, for example, perfor- mance, availability, eectiveness, ...service for providing a quality level to ... Voir le document complet

195

Analysis & design of control for distributed embedded systems under communication constraints

Analysis & design of control for distributed embedded systems under communication constraints

... ing and control ...[Martins and Daleh, 2005] also shows that the Shannon Channel Capacity C (which is the maximum possible data rate the channel can support with tolerable level of error) of the feedback ... Voir le document complet

143

Show all 10000 documents...