Sciweavers

919 search results - page 153 / 184
» A Case Study in Systematic Improvement of Language for Requi...
Sort
View
SARA
2009
Springer
14 years 3 months ago
Common Subexpressions in Constraint Models of Planning Problems
Constraint Programming is an attractive approach for solving AI planning problems by modelling them as Constraint Satisfaction Problems (CSPs). However, formulating effective cons...
Andrea Rendl, Ian Miguel, Ian P. Gent, Peter Grego...
ISCAS
2008
IEEE
85views Hardware» more  ISCAS 2008»
14 years 2 months ago
Frame-parallel design strategy for high definition B-frame H.264/AVC encoder
High Definition (HD) H.264/AVC video compression is the emerging necessity on nowadays home entertainment environment and so on. However, Although B-frame coding scheme provides ...
Yi-Hau Chen, Tzu-Der Chuang, Yu-Han Chen, Chen-Han...
ICMCS
2007
IEEE
117views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Digital Media Indexing on the Cell Processor
We present a case study of developing a digital media indexing application, code-named MARVEL, on the STI Cell Broadband Engine (CBE) processor. There are two aspects of the targe...
Lurng-Kuo Liu, Qiang Liu, Apostol Natsev, Kenneth ...
ICSE
2007
IEEE-ACM
14 years 2 months ago
Architecture Knowledge Management: Challenges, Approaches, and Tools
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software develo...
Muhammad Ali Babar, Ian Gorton
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 2 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...