Abstract is missing.
- The federated scheduling of systems of conditional sporadic DAG tasksSanjoy Baruah. 1-10 [doi]
- Adaptive runtime shaping for mixed-criticality systemsBiao Hu, Kai Huang, Gang Chen, Long Cheng, Alois Knoll. 11-20 [doi]
- Can real-time systems be chaotic?Lothar Thiele, Pratyush Kumar. 21-30 [doi]
- Requirements driven falsification with coverage metricsAdel Dokhanchi, Aditya Zutshi 0001, Rahul T. Sriniva, Sriram Sankaranarayanan, Georgios E. Fainekos. 31-40 [doi]
- Reachability of hybrid systems in space-timeGoran Frehse. 41-50 [doi]
- Unbounded-time reachability analysis of hybrid systems by abstract accelerationPeter Schrammel. 51-54 [doi]
- Towards an industrial use of sound static analysis for the verification of concurrent embedded avionics softwareAntoine Miné, David Delmas. 65-74 [doi]
- A scalable algebraic method to infer quadratic invariants of switched systemsXavier Allamigeon, Stéphane Gaubert, Eric Goubault, Sylvie Putot, Nikolas Stott. 75-84 [doi]
- Loosely time-triggered architectures: improvements and comparisonsGuillaume Baudart, Albert Benveniste, Timothy Bourke. 85-94 [doi]
- Parametrized dataflow scenariosMladen Skelin, Marc Geilen, Francky Catthoor, Sverre Hendseth. 95-104 [doi]
- Executing dataflow actors as kahn processesAndreas Tretter, Jani Boutellier, James Guthrie, Lars Schor, Lothar Thiele. 105-114 [doi]
- Modeling and simulating cyber-physical systems using CyPhySimEdward A. Lee, Mehrdad Niknami, Thierry S. Nouidui, Michael Wetter. 115-124 [doi]
- Building a hybrid systems modeler from synchronous language principlesMarc Pouzet. 125-126 [doi]
- Formal verification of ACAS X, an industrial airborne collision avoidance systemJean-Baptiste Jeannin, Khalil Ghorbal, Yanni Kouskoulas, Ryan Gardner, Aurora Schmidt, Erik Zawadzki, André Platzer. 127-136 [doi]
- Scalable scheduling of energy control systemsTruong X. Nghiem, Rahul Mangharam. 137-146 [doi]
- Distributed power management of real-time applications on a GALS multiprocessor SOCAndrew Nelson, Kees G. W. Goossens. 147-156 [doi]
- Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacksCarlos Moreno, M. Anwar Hasan, Sebastian Fischmeister. 157-166 [doi]
- Data mining approach to temporal debugging of embedded streaming applicationsOleg Iegorov, Vincent Leroy, Alexandre Termier, Jean-François Méhaut, Miguel Santana. 167-176 [doi]
- A framework for mining hybrid automata from input/output tracesRamy Medhat, S. Ramesh, Borzoo Bonakdarpour, Sebastian Fischmeister. 177-186 [doi]
- Static memory management for efficient mobile sensing applicationsFarley Lai, Daniel Schmidt, Octav Chipara. 187-196 [doi]
- Nonvolatile main memory aware garbage collection in high-level language virtual machineChen Pan, Mimi Xie, Chengmo Yang, Zili Shao, Jingtong Hu. 197-206 [doi]
- Managing gpu buffers for caching more apps in mobile systemsSejun Kwon, Sang-Hoon Kim, Jin-Soo Kim, Jinkyu Jeong. 207-216 [doi]
- Automatic verification of linear controller softwareMiroslav Pajic, Junkil Park, Insup Lee, George J. Pappas, Oleg Sokolsky. 217-226 [doi]
- Forward invariant cuts to simplify proofs of safetyNikos Arechiga, James Kapinski, Jyotirmoy V. Deshmukh, André Platzer, Bruce H. Krogh. 227-236 [doi]
- Bounded error flowpipe computation of parameterized linear systemsRatan Lal, Pavithra Prabhakar. 237-246 [doi]
- Verifying network performance of cyber-physical systems with multiple runtime configurationsMartin Manderscheid, Gereon Weiss, Rudi Knorr. 247-255 [doi]
- Using traffic phase shifting to improve AFDX link utilizationRenato Mancuso, Andrew V. Louis, Marco Caccamo. 256-265 [doi]