Sciweavers

1026 search results - page 156 / 206
» A Methodology for Equational Reasoning
Sort
View
ISQED
2008
IEEE
186views Hardware» more  ISQED 2008»
14 years 3 months ago
Reliability-Aware Optimization for DVS-Enabled Real-Time Embedded Systems
—Power and energy consumption has emerged as the premier and most constraining aspect in modern computational systems. Dynamic Voltage Scheduling (DVS) has been provably one of t...
Foad Dabiri, Navid Amini, Mahsan Rofouei, Majid Sa...
ADHOCNOW
2008
Springer
14 years 3 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
AVSS
2007
IEEE
14 years 3 months ago
Using social effects to guide tracking in complex scenes
This paper presents a new methodology for improving the tracking of multiple targets in complex scenes. The new method, Motion Parameter Sharing, incorporates social motion inform...
Andrew French, Asad Naeem, Ian L. Dryden, Tony P. ...
CCGRID
2007
IEEE
14 years 3 months ago
Adaptive Performance Modeling on Hierarchical Grid Computing Environments
In the past, efficient parallel algorithms have always been developed specifically for the successive generations of parallel systems (vector machines, shared-memory machines, d...
Wahid Nasri, Luiz Angelo Steffenel, Denis Trystram
IPCCC
2007
IEEE
14 years 3 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...