Sciweavers

833 search results - page 103 / 167
» A Design and Test Technique for Embedded Software
Sort
View
MEDIAFORENSICS
2010
13 years 10 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
ICECCS
2002
IEEE
106views Hardware» more  ICECCS 2002»
14 years 1 months ago
Validating Run-time Interactions in Distributed Java Applications
Distributed Java applications represent a large growth area in software. Validating such applications using information from runtime interactions is a challenge. We propose techni...
Sudipto Ghosh, Nishant Bawa, Sameer Goel, Raghu Re...
CASES
2004
ACM
14 years 18 days ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
AOSD
2011
ACM
13 years 3 months ago
Aspect-aware operating system development
The domain of operating systems has often been mentioned as an “ideal candidate” for the application of AOP; fundamental policies we find in these systems, such as synchroniz...
Daniel Lohmann, Wanja Hofer, Wolfgang Schröde...
COMPGEOM
1996
ACM
14 years 1 months ago
Robust Adaptive Floating-Point Geometric Predicates
Fast C implementations of four geometric predicates, the 2D and 3D orientation and incircle tests, are publicly available. Their inputs are ordinary single or double precision flo...
Jonathan Richard Shewchuk