Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2010
- Tesnim Abdellatif, Jacques Combaz, Joseph Sifakis:
Model-based implementation of real-time applications. EMSOFT 2010: 229-238 - Albert Benveniste, Anne Bouillard, Paul Caspi:
A unifying view of loosely time-triggered architectures. EMSOFT 2010: 189-198 - Borzoo Bonakdarpour, Marius Bozga, Mohamad Jaber, Jean Quilbeuf, Joseph Sifakis:
From high-level component-based models to distributed implementations. EMSOFT 2010: 209-218 - Christian Buckl, Irina Gaponova, Michael Geisinger, Alois C. Knoll, Edward A. Lee:
Model-based specification of timing requirements. EMSOFT 2010: 239-248 - Samarjit Chakraborty, S. Ramesh, Jürgen Teich:
Model-based analysis, synthesis and testing of automotive hardware/software architectures. EMSOFT 2010: 299-300 - Yuan-Hao Chang, Tei-Wei Kuo:
A reliable MTD design for MLC flash-memory storage systems. EMSOFT 2010: 179-188 - Min-Hua Chen, Pai H. Chou:
TeleScribe: a scalable, resumable wireless reprogramming approach. EMSOFT 2010: 139-148 - Yongjin Cho, Seungkyun Kim, Jaejin Lee, Heonshik Shin:
Parallelizing the H.264 decoder on the cell BE architecture. EMSOFT 2010: 49-58 - Kwangyoon Cho, Kyoung-Soo We, Chang-Gun Lee, Kanghee Kim:
Using NAND flash memory for executing large volume real-time programs in automotive embedded systems. EMSOFT 2010: 159-168 - Silviu S. Craciunas, Christoph M. Kirsch, Ana Sokolova:
Power-aware temporal isolation with variable-bandwidth servers. EMSOFT 2010: 259-268 - Thomas Huining Feng, Edward A. Lee, Lee W. Shruben:
Ptera: an event-oriented model of computation for heterogeneous systems. EMSOFT 2010: 219-228 - Jiwon Hahn, Pai H. Chou:
Nucleos: a runtime system for ultra-compact wireless sensor nodes. EMSOFT 2010: 149-158 - Thomas A. Henzinger, Anmol V. Singh, Vasu Singh, Thomas Wies, Damien Zufferey:
A marketplace for cloud resources. EMSOFT 2010: 1-8 - Holger Hermanns, Kim Guldstrand Larsen, Jean-François Raskin, Jan Tretmans:
Quantitative system validation in model driven design. EMSOFT 2010: 301-302 - Padma Iyenghar, Clemens Westerkamp, Juergen Wuebbelmann, Elke Pulvermüller:
A model based approach for debugging embedded systems in real-time. EMSOFT 2010: 69-78 - Ethan K. Jackson, Eunsuk Kang, Markus Dahlweid, Dirk Seifert, Thomas Santen:
Components, platforms and possibilities: towards generic automation for MDA. EMSOFT 2010: 39-48 - Tushar Kumar, Romain Cledat, Santosh Pande:
Dynamic tuning of feature set in highly variant interactive applications. EMSOFT 2010: 289-298 - Hunki Kwon, Eunsam Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh:
Janus-FTL: finding the optimal point on the spectrum between page and block mapping schemes. EMSOFT 2010: 169-178 - Jinkyu Lee, Insik Shin, Arvind Easwaran:
Online robust optimization framework for QoS guarantees in distributed soft real-time systems. EMSOFT 2010: 89-98 - Haohan Li, Sanjoy K. Baruah:
Load-based schedulability analysis of certifiable mixed-criticality systems. EMSOFT 2010: 99-108 - Kevin Marquet, Matthieu Moy:
PinaVM: a systemC front-end based on an executable intermediate representation. EMSOFT 2010: 79-88 - Adolfo Anta Martinez, Rupak Majumdar, Indranil Saha, Paulo Tabuada:
Automatic verification of control system implementations. EMSOFT 2010: 9-18 - Linh Thi Xuan Phan, Reinhard Schneider, Samarjit Chakraborty, Insup Lee:
Modeling buffers with data refresh semantics in automotive architectures. EMSOFT 2010: 119-128 - Joseph Porter, Graham Hemingway, Nicholas Kottenstette, Gabor Karsai, Janos Sztipanovits:
Online stability validation using sector analysis. EMSOFT 2010: 29-38 - Dumitru Potop-Butucaru, Akramul Azim, Sebastian Fischmeister:
Semantics-preserving implementation of synchronous specifications over dynamic TDMA distributed architectures. EMSOFT 2010: 199-208 - A. C. Rajeev, Swarup Mohalik, Manoj G. Dixit, Devesh B. Chokshi, S. Ramesh:
Schedulability and end-to-end latency in distributed ECU networks: formal modeling and precise estimation. EMSOFT 2010: 129-138 - Luca Santinelli, Mauro Marinoni, Francesco Prosperi, Francesco Esposito, Gianluca Franchino, Giorgio C. Buttazzo:
Energy-aware packet and task co-scheduling for embedded systems. EMSOFT 2010: 279-288 - Nikolay Stoimenov, Lothar Thiele, Luca Santinelli, Giorgio C. Buttazzo:
Resource adaptations with servers for hard real-time systems. EMSOFT 2010: 269-278 - Ankur Taly, Ashish Tiwari:
Switching logic synthesis for reachability. EMSOFT 2010: 19-28 - Sally K. Wahba, Jason O. Hallstrom, Neelam Soundarajan:
Initiating a design pattern catalog for embedded network systems. EMSOFT 2010: 249-258
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-06 01:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint