default search action
13. EMSOFT 2013: Montreal, QC, Canada
- Rolf Ernst, Oleg Sokolsky:
Proceedings of the International Conference on Embedded Software, EMSOFT 2013, Montreal, QC, Canada, September 29 - Oct. 4, 2013. IEEE 2013, ISBN 978-1-4799-1443-2 - Rolf Ernst, Oleg Sokolsky:
Message from the program co-chairs. - Guillaume Baudart, Florent Jacquemard, Louis Mandel, Marc Pouzet:
A synchronous embedding of Antescofo, a domain-specific language for interactive mixed music. 1:1-1:12 - David Broman, Christopher X. Brooks, Lev Greenberg, Edward A. Lee, Michael Masin, Stavros Tripakis, Michael Wetter:
Determinate composition of FMUs for co-simulation. 2:1-2:12 - Vagelis Bebelis, Pascal Fradet, Alain Girault, Bruno Lavigueur:
BPDF: A statically analyzable dataflow model with integer and boolean parameters. 3:1-3:10 - Biswajit Mazumder, Jason O. Hallstrom:
An efficient code update solution for wireless sensor network reprogramming. 4:1-4:10 - Abdullah Al-Nayeem, Cheolgi Kim, Woochul Kang, Po-Liang Wu, Lui Sha:
Middleware design for Physically-Asynchronous Logically-Synchronous (PALS) systems. 5:1-5:10 - Yeong-Jae Woo, Jin-Soo Kim:
Diversifying wear index for MLC NAND flash memory to extend the lifetime of SSDs. 6:1-6:10 - Parasara Sridhar Duggirala, Ashish Tiwari:
Safety verification for linear systems. 7:1-7:10 - Paula Herber, Robert Reicherdt, Patrick Bittner:
Bit-precise formal verification of discrete-time MATLAB/Simulink Models using SMT Solving. 8:1-8:10 - Liang Zou, Naijun Zhan, Shuling Wang, Martin Fränzle, Shengchao Qin:
Verifying Simulink diagrams via a Hybrid Hoare Logic Prover. 9:1-9:10 - Magnus Persson, Martin Törngren, Ahsan Qamar, Jonas Westman, Matthias Biehl, Stavros Tripakis, Hans Vangheluwe, Joachim Denil:
A characterization of integrated multi-view modeling in the context of embedded and cyber-physical systems. 10:1-10:10 - Ethan K. Jackson, Gabor Simko, Janos Sztipanovits:
Diversely enumerating system-level architectures. 11:1-11:10 - Eleftherios Matsikoudis, Christos Stergiou, Edward A. Lee:
On the schedulability of real-time discrete-event systems. 12:1-12:15 - David Harel, Amir Kantor, Guy Katz, Assaf Marron, Lior Mizrahi, Gera Weiss:
On composing and proving the correctness of reactive behavior. 13:1-13:10 - Sergio Mover, Alessandro Cimatti, Ashish Tiwari, Stefano Tonetta:
Time-aware relational abstractions for hybrid systems. 14:1-14:10 - Duc-Hiep Chu, Joxan Jaffar:
Path-sensitive resource analysis compliant with assertions. 15:1-15:10 - Jan C. Kleinsorge, Heiko Falk, Peter Marwedel:
Simple analysis of partial worst-case execution paths on general control flow graphs. 16:1-16:10 - Georgia Giannopoulou, Nikolay Stoimenov, Pengcheng Huang, Lothar Thiele:
Scheduling of mixed-criticality applications on resource-sharing multicore systems. 17:1-17:15 - Andrea Baldovin, Enrico Mezzetti, Tullio Vardanega:
Limited preemptive scheduling of non-independent task sets. 18:1-18:10 - Henry Hoffmann, Martina Maggio, Marco D. Santambrogio, Alberto Leva, Anant Agarwal:
A generalized software framework for accurate and efficient management of performance goals. 19:1-19:10 - Dai N. Bui, Edward A. Lee:
StreaMorph: A case for synthesizing energy-efficient adaptive programs using high-level abstractions. 20:1-20:10 - Rajiv Nishtala, Daniel Mossé, Vinicius Petrucci:
Energy-aware thread co-location in heterogeneous multicore processors. 21:1-21:9 - Eva Darulova, Viktor Kuncak, Rupak Majumdar, Indranil Saha:
Synthesis of fixed-point programs. 22:1-22:10 - Amir Aminifar, Petru Eles, Zebo Peng, Anton Cervin:
Stability-aware analysis and design of embedded control systems. 23:1-23:10 - Pavithra Prabhakar, Jun Liu, Richard M. Murray:
Pre-orders for reasoning about stability properties with respect to input of hybrid systems. 24:1-24:10 - Pansy Arafa, Hany Kashif, Sebastian Fischmeister:
DIME: Time-aware dynamic binary instrumentation using rate-based resource allocation. 25:1-25:10 - Parasara Sridhar Duggirala, Sayan Mitra, Mahesh Viswanathan:
Verification of annotated models from executions. 26:1-26:10 - Kwanghwan Kim, Hojung Cha:
WakeScope: Runtime WakeLock anomaly management scheme for Android platform. 27:1-27:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.