default search action
14. EMSOFT 2014: New Delhi, India
- Tulika Mitra, Jan Reineke:
2014 International Conference on Embedded Software, EMSOFT 2014, New Delhi, India, October 12-17, 2014. ACM 2014 - Joost-Pieter Katoen, Hao Wu:
Exponentially timed SADF: Compositional semantics, reductions, and analysis. 1:1-1:10 - Viorel Preoteasa, Stavros Tripakis:
Refinement calculus of reactive systems. 2:1-2:10 - Rajeev Alur, Nimit Singhania:
Precise piecewise affine models from input-output data. 3:1-3:10 - Jian-Jia Chen, Muhammad Shafique:
Embedded software reliability for unreliable hardware. 4:1 - Aditya Zutshi, Jyotirmoy V. Deshmukh, Sriram Sankaranarayanan, James Kapinski:
Multiple shooting, CEGAR-based falsification for hybrid systems. 5:1-5:10 - Mohammad Mehdi Zeinali Zadeh, Mahmoud Salem, Neeraj Kumar, Greta Cutulenco, Sebastian Fischmeister:
SiPTA: Signal processing for trace-based anomaly detection. 6:1-6:10 - Gregor Goessler, Lacramioara Astefanoaei:
Blaming in component-based real-time systems. 7:1-7:10 - Pascal Raymond:
A general approach for expressing infeasibility in Implicit Path Enumeration Technique. 8:1-8:9 - Jan C. Kleinsorge, Peter Marwedel:
Computing maximum blocking times with explicit path analysis under non-local flow bounds. 9:1-9:10 - Zain Alabedin Haj Hammadeh, Sophie Quinton, Rolf Ernst:
Extending typical worst-case analysis using response-time dependencies to bound deadline misses. 10:1-10:10 - Pengcheng Huang, Pratyush Kumar, Georgia Giannopoulou, Lothar Thiele:
Energy efficient DVFS scheduling for mixed-criticality systems. 11:1-11:10 - Pratyush Kumar, Lothar Thiele:
P-YDS algorithm: An optimal extension of YDS algorithm to minimize expected energy for real-time jobs. 12:1-12:10 - Alberto Puggelli, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia:
Robust strategy synthesis for probabilistic systems applied to risk-limiting renewable-energy pricing. 13:1-13:10 - Rayna Dimitrova, Rupak Majumdar:
Deductive control synthesis for alternating-time logics. 14:1-14:10 - Hadi Ravanbakhsh, Sriram Sankaranarayanan:
Infinite horizon safety controller synthesis through disjunctive polyhedral abstract interpretation. 15:1-15:10 - Marco Diciolla, Chang Hwan Peter Kim, Marta Z. Kwiatkowska, Alexandru Mereacre:
Synthesising optimal timing delays for Timed I/O Automata. 16:1-16:10 - Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Automated software testing of memory performance in embedded GPUs. 17:1-17:10 - Young Wn Song, Yann-Hang Lee:
On the existence of probe effect in multi-threaded embedded programs. 18:1-18:9 - Björn Döbel, Hermann Härtig:
Can we put concurrency back into redundant multithreading? 19:1-19:10 - Ahmed Alhammad, Rodolfo Pellizzoni:
Schedulability analysis of global memory-predictable scheduling. 20:1-20:10 - Guangmo Tong, Cong Liu:
Supporting read/write applications in embedded real-time systems via suspension-aware analysis. 21:1-21:10 - Husheng Zhou, Cong Liu:
Task mapping in heterogeneous embedded systems for fast completion time. 22:1-22:10 - Ivan Ruchkin, Dionisio de Niz, Sagar Chaki, David Garlan:
Contract-based integration of cyber-physical analyses. 23:1-23:10 - Garvit Juniwal, Alexandre Donzé, Jeff C. Jensen, Sanjit A. Seshia:
CPSGrader: Synthesizing temporal logic testers for auto-grading an embedded systems laboratory. 24:1-24:10 - David Ferry, Gregory Bunting, Amin Maghareh, Arun Prakash, Shirley Dyke, Kunal Agrawal, Christopher D. Gill, Chenyang Lu:
Real-time system support for hybrid structural simulation. 25:1-25:40 - Milos Panic, Eduardo Quiñones, Pavel G. Zaykov, Carles Hernández, Jaume Abella, Francisco J. Cazorla:
Parallel many-core avionics systems. 26:1-26:10 - Sisu Xi, Meng Xu, Chenyang Lu, Linh T. X. Phan, Christopher D. Gill, Oleg Sokolsky, Insup Lee:
Real-time multi-core virtual machine scheduling in Xen. 27:1-27:10 - Borislav Nikolic, Stefan M. Petters:
EDF as an arbitration policy for wormhole-switched priority-preemptive NoCs - Myth or fact? 28:1-28:10 - Kan Zhong, Tianzheng Wang, Xiao Zhu, Linbo Long, Duo Liu, Weichen Liu, Zili Shao, Edwin Hsing-Mean Sha:
Building high-performance smartphones via non-volatile memory: The swap approach. 30:1-30:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.