Excise 发表于 2025-3-26 21:20:51
Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension of distributed applications; it provides tools to organize the applications using a layered architecture, with the network(s) at the bottom of the architecture. Neko is also a communication platform that allows sending and receiving of generic Java objects. Distributed systems realized within the NHATCH 发表于 2025-3-27 02:36:01
http://reply.papertrans.cn/27/2658/265704/265704_32.pngMedicaid 发表于 2025-3-27 05:24:17
A Method for Modeling and Testing Exceptions in Component-Based Software Developmenttention from existing development methodologies. This work presents a systematic way to deal with exception handling, from the requirement specification phase to the implementation and testing phases, in component-based software development. Testing activities are performed since the early stages ofPRE 发表于 2025-3-27 10:37:05
http://reply.papertrans.cn/27/2658/265704/265704_34.png间接 发表于 2025-3-27 16:27:35
The Zerberus Language: Describing the Functional Model of Dependable Real-Time Systemsem assists the developer in the design and implementation process. Main features of the Zerberus System are generality, dependability, real-time predictability, the ability to be certified and cost-efficiency..The main concept of the Zerberus System is the platform independent specification of the fmembrane 发表于 2025-3-27 19:12:51
Soft Error Mitigation in Cache Memories of Embedded Systems by Means of a Protected Schemerable to soft errors originated from energetic nuclear particles or electrical sources. This paper proposes a new protected cache scheme, which provides high performance as well as high fault detection coverage. In this scheme, the cache space is divided into sets of different sizes. Here, the lengtphlegm 发表于 2025-3-27 22:39:00
On the Effects of Errors During Boot hardware is initialized, and the processor executes the boot loader followed by kernel initialization. For this reason most system support is not yet available and traditional fault-injection techniques such as . cannot be used. Thus our study was based in the processor’s IEEE 1149.1 (boundary-scanobscurity 发表于 2025-3-28 04:33:36
A Fault Tolerant Approach to Object Oriented Design and Synthesis of Embedded Systemsject-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network onoverhaul 发表于 2025-3-28 07:26:04
http://reply.papertrans.cn/27/2658/265704/265704_39.png蔑视 发表于 2025-3-28 12:25:36
http://reply.papertrans.cn/27/2658/265704/265704_40.png