Sciweavers

833 search results - page 103 / 167
» A Design and Test Technique for Embedded Software
Sort
View
MEDIAFORENSICS
2010
15 years 5 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
ICECCS
2002
IEEE
106views Hardware» more  ICECCS 2002»
15 years 9 months ago
Validating Run-time Interactions in Distributed Java Applications
Distributed Java applications represent a large growth area in software. Validating such applications using information from runtime interactions is a challenge. We propose techni...
Sudipto Ghosh, Nishant Bawa, Sameer Goel, Raghu Re...
CASES
2004
ACM
15 years 7 months ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
AOSD
2011
ACM
14 years 11 months ago
Aspect-aware operating system development
The domain of operating systems has often been mentioned as an “ideal candidate” for the application of AOP; fundamental policies we find in these systems, such as synchroniz...
Daniel Lohmann, Wanja Hofer, Wolfgang Schröde...
COMPGEOM
1996
ACM
15 years 8 months ago
Robust Adaptive Floating-Point Geometric Predicates
Fast C implementations of four geometric predicates, the 2D and 3D orientation and incircle tests, are publicly available. Their inputs are ordinary single or double precision flo...
Jonathan Richard Shewchuk