New solutions for useful execution models of communicating adaptive ra2dl, Intelligent Software Methodologies, Tools and Techniques, vol.532, pp.87-101, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02425170
Uppaal: A tool suite for automatic verification of real-time systems, pp.232-243, 1996. ,
Containers and cloud: From lxc to docker to kubernetes, Cloud Computing, IEEE, vol.1, issue.3, pp.81-84, 2014. ,
A body-monitoring system with eeg and eog sensors, Journal of ERCIM News, issue.49, 2002. ,
Component-based systems: a classification of issues, Computer, vol.33, issue.11, pp.54-62, 2000. ,
Component-based software engineering: technologies, development frameworks, and quality assurance schemes, Software Engineering Conference, pp.372-379, 2000. ,
A survey of architecture description languages, Proceedings of the 8th International Workshop on Software Specification and Design, IWSSD '96, p.16, 1996. ,
An architecture-based dependability modeling framework using aadl, 10th IASTED International Conference on Software Engineering and Applications SEA2006, 2006. ,
Ra2dl: New flexible solution for adaptive aadl-based control components, Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems, pp.247-258, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01126501
Building secure systems using model-based engineering and architectural models, CrossTalk: The Journal of Defense Software Engineering, vol.21, issue.9, 2008. ,
Body monitoring using local area wireless interfaces, p.865, 2004. ,
The mils architecture for high assurance embedded systems, International Journal of Embedded Systems, 2006. ,
Umlsec: Extending uml for secure systems development, Proceedings of the 5th International Conference on The Unified Modeling Language, UML '02, pp.412-425, 2002. ,
Security as a new dimension in embedded system design, Proceedings of the 41st Annual Design Automation Conference, DAC '04, pp.753-760, 2004. ,
A secure architectural description language for agent systems, Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS '05, pp.578-585, 2005. ,
Security needs in embedded systems, Cryptology ePrint Archive, 2008. ,
A software architectural approach to security by design, 30th Annual International Computer Software and Applications Conference, COMPSAC, vol.2, pp.83-86, 2006. ,
A secure software architecture description language, Workshop on Software Security Assurance Tools, Techniques, and Metrics, pp.82-89, 2005. ,
Zizo: Modeling, simulation and verification of reconfigurable real-time control tasks sharing adaptive resources -application to the medical project bros, Proceedings of the International Conference on Health Informatics, pp.20-31, 2015. ,
Using the aadl to describe distributed applications from middleware to software components, Reliable Software Technology -Ada-Europe 2005, 10th Ada-Europe International Conference on Reliable Software Technologies, pp.67-78, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-01493416
Secure pap-based RADIUS protocol in wireless networks, Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, pp.689-694, 2007. ,