Sciweavers

282 search results - page 49 / 57
» A Framework for Top-Down Cost Estimation of Software Develop...
Sort
View
FPL
2008
Springer
207views Hardware» more  FPL 2008»
13 years 9 months ago
Bitstream compression techniques for Virtex 4 FPGAs
This paper examines the opportunity of using compression for accelerating the (re)configuration of FPGA devices, focusing on the choice of compression algorithms, and their hardwa...
Radu Stefan, Sorin Dan Cotofana
CAINE
2007
13 years 9 months ago
A Novel Peak Detection Algorithm for Use in the Study of Machining Chip Segmentation
The study of how metal deforms and flows as parts are machined yields important insights into the metal cutting process. Improvements in high-speed digital imaging and image proce...
Eric Whitenton, Robert Ivester, Jarred Heigel
CASCON
1996
160views Education» more  CASCON 1996»
13 years 9 months ago
Automatic generation of performance models for distributed application systems
Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...
VLDB
2007
ACM
141views Database» more  VLDB 2007»
14 years 8 months ago
Query Processing over Incomplete Autonomous Databases
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Garrett Wolf, Hemal Khatri, Bhaumik Chokshi, Jianc...
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna