Automated synthesis of safe timing behaviors for requirements models using CCSL

M Hu, J **a, M Zhang, X Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As a promising requirement-level specification language for timing behavior modeling, the
clock constraint specification language (CCSL) has become popular in the model-driven …

A prediction model for measurement-based timing analysis

SAB Shah, M Rashid, M Arif - … of the 6th International Conference on …, 2017 - dl.acm.org
Temporal testing of real-time software is critical. Search-based software engineering (SBSE)
has shown its potential to assist the temporal testing by generating the test data. However …

A framework to specify system requirements using natural interpretation of UML/MARTE diagrams

AM Khan, F Mallet, M Rashid - Software & Systems Modeling, 2019 - Springer
The ever-increasing design complexity of embedded systems is constantly pressing the
demand for more abstract design levels and possible methods for automatic verification and …

[PDF][PDF] Model-Based System Engineering for Embedded Systems: Comparison of Selected Methodologies

S Alqurashi, A Albeladi, S Al-Sahli - 2019 - researchgate.net
embedded systems are complex systems that are used in various areas. In the designing
stages, model-based system engineering (MBSE) is used to make the requirements of the …

[PDF][PDF] Logic-Intensive Reconfigurable Architectures and Supporting CAD Tools‖

A Asghar, MM Iqbal, W Ahmed, M Ali, H Parvez… - researchgate.net
The objective of this project is to optimize the following four parameters of Field
Programmable Gate Array (FPGA) architecture: area, configuration bits, configuration time …

[PDF][PDF] Design and Verification of Safety Critical Systems‖

MW Anwar, M Kashif, A Khan, MW Aziz, YI Zia, AR Jafri… - researchgate.net
The objective is to develop a holistic development methodology for embedded systems,
where the abstract is married to the physical. The impact was twofold: model based design …

[PDF][PDF] Integrated Design Environment for Cryptographic Applications

M Imran - researchgate.net
(ECC). Furthermore, we have observed that the hardware architectures of finite field (FF)
multipliers are commonly used for polynomial as well as for normal bases representations …