Stop the war!
Остановите войну!
for scientists:
default search action
15. EMSOFT 2015: Amsterdam, The Netherlands
- Alain Girault, Nan Guan:
2015 International Conference on Embedded Software, EMSOFT 2015, Amsterdam, Netherlands, October 4-9, 2015. IEEE 2015, ISBN 978-1-4673-8079-9 - Sanjoy K. Baruah:
The federated scheduling of systems of conditional sporadic DAG tasks. 1-10 - Biao Hu, Kai Huang, Gang Chen, Long Cheng, Alois C. Knoll:
Adaptive runtime shaping for mixed-criticality systems. 11-20 - Lothar Thiele, Pratyush Kumar:
Can real-time systems be chaotic? 21-30 - Adel Dokhanchi, Aditya Zutshi, Rahul T. Sriniva, Sriram Sankaranarayanan, Georgios Fainekos:
Requirements driven falsification with coverage metrics. 31-40 - Goran Frehse:
Reachability of hybrid systems in space-time. 41-50 - Peter Schrammel:
Unbounded-time reachability analysis of hybrid systems by abstract acceleration. 51-54 - Antoine Miné, David Delmas:
Towards an industrial use of sound static analysis for the verification of concurrent embedded avionics software. 65-74 - Xavier Allamigeon, Stéphane Gaubert, Eric Goubault, Sylvie Putot, Nikolas Stott:
A scalable algebraic method to infer quadratic invariants of switched systems. 75-84 - Guillaume Baudart, Albert Benveniste, Timothy Bourke:
Loosely time-triggered architectures: improvements and comparisons. 85-94 - Mladen Skelin, Marc Geilen, Francky Catthoor, Sverre Hendseth:
Parametrized dataflow scenarios. 95-104 - Andreas Tretter, Jani Boutellier, James Guthrie, Lars Schor, Lothar Thiele:
Executing dataflow actors as kahn processes. 105-114 - Edward A. Lee, Mehrdad Niknami, Thierry S. Nouidui, Michael Wetter:
Modeling and simulating cyber-physical systems using CyPhySim. 115-124 - Marc Pouzet:
Building a hybrid systems modeler from synchronous language principles. 125-126 - Jean-Baptiste Jeannin, Khalil Ghorbal, Yanni Kouskoulas, Ryan W. Gardner, Aurora C. Schmidt, Erik Zawadzki, André Platzer:
Formal verification of ACAS X, an industrial airborne collision avoidance system. 127-136 - Truong X. Nghiem, Rahul Mangharam:
Scalable scheduling of energy control systems. 137-146 - Andrew Nelson, Kees Goossens:
Distributed power management of real-time applications on a GALS multiprocessor SOC. 147-156 - Carlos Moreno, M. Anwar Hasan, Sebastian Fischmeister:
Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacks. 157-166 - Oleg Iegorov, Vincent Leroy, Alexandre Termier, Jean-François Méhaut, Miguel Santana:
Data mining approach to temporal debugging of embedded streaming applications. 167-176 - Ramy Medhat, S. Ramesh, Borzoo Bonakdarpour, Sebastian Fischmeister:
A framework for mining hybrid automata from input/output traces. 177-186 - Farley Lai, Daniel Schmidt, Octav Chipara:
Static memory management for efficient mobile sensing applications. 187-196 - Chen Pan, Mimi Xie, Chengmo Yang, Zili Shao, Jingtong Hu:
Nonvolatile main memory aware garbage collection in high-level language virtual machine. 197-206 - Sejun Kwon, Sang-Hoon Kim, Jin-Soo Kim, Jinkyu Jeong:
Managing gpu buffers for caching more apps in mobile systems. 207-216 - Miroslav Pajic, Junkil Park, Insup Lee, George J. Pappas, Oleg Sokolsky:
Automatic verification of linear controller software. 217-226 - Nikos Aréchiga, James Kapinski, Jyotirmoy V. Deshmukh, André Platzer, Bruce H. Krogh:
Forward invariant cuts to simplify proofs of safety. 227-236 - Ratan Lal, Pavithra Prabhakar:
Bounded error flowpipe computation of parameterized linear systems. 237-246 - Martin Manderscheid, Gereon Weiss, Rudi Knorr:
Verifying network performance of cyber-physical systems with multiple runtime configurations. 247-255 - Renato Mancuso, Andrew V. Louis, Marco Caccamo:
Using traffic phase shifting to improve AFDX link utilization. 256-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.