2006
publication
Node-Density Independent Localization
There is an increasing concern of security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be an effective solution for embedded systems design. In this paper we show that existing modeling tools are not sufficient to meet the current and future security challenges of networked embedded systems. We propose a framework to integrate security modeling in embedded system design. We’ve developed an example co-design environment that addresses security, functionality and system architecture aspects of embedded systems.
publication
ISIS Overview 2005
publication
Adaptive blended learning environments
Model transformation tools implemented using graph transformation techniques are often expected to provide high performance. For this reason, in the Graph Rewriting and Transformation (GReAT) language we have supported two techniques: pre-binding of selected pattern variables and explicit sequencing of transformation steps to improve the performance of the transformation engine. When applied to practical situations, we recognized three shortcomings in our approach: (1) no support for the convenient reuse of results of one rewriting step in another, distant step, (2) lack of a sorting capability for ordering the results of the pattern matching, and (3) absence of support for the distinguished merging of results of multiple pattern matches. In this paper we briefly highlight the relevant features of GReAT, describe three motivating examples that illustrate the problems, introduce our solutions: new extensions to the language, and compare the approaches to other languages.
publication