Sciweavers

71 search results - page 9 / 15
» A Step Towards Practical Steganography Systems
Sort
View
ASE
2006
114views more  ASE 2006»
13 years 7 months ago
Explicit modeling of semantics associated with composite states in UML statecharts
: UML statecharts are used for describing dynamic aspects of system behavior. The work presented here extends a general Petri net-based methodology to support formal modeling of UM...
Zhaoxia Hu, Sol M. Shatz
CORR
2011
Springer
178views Education» more  CORR 2011»
13 years 2 months ago
Anytime Reliable Codes for Stabilizing Plants over Erasure Channels
—The problem of stabilizing an unstable plant over a noisy communication link is an increasingly important one that arises in problems of distributed control and networked contro...
Ravi Teja Sukhavasi, Babak Hassibi
INFORMS
1998
150views more  INFORMS 1998»
13 years 7 months ago
Branch and Infer: A Unifying Framework for Integer and Finite Domain Constraint Programming
constraint abstractions into integer programming, and to discuss possible combinations of the two approaches. Combinatorial problems are ubiquitous in many real world applications ...
Alexander Bockmayr, Thomas Kasper
ISCA
2000
IEEE
107views Hardware» more  ISCA 2000»
14 years 1 days ago
A fully associative software-managed cache design
As DRAM access latencies approach a thousand instructionexecution times and on-chip caches grow to multiple megabytes, it is not clear that conventional cache structures continue ...
Erik G. Hallnor, Steven K. Reinhardt
MOBIDE
2005
ACM
14 years 1 months ago
Recovery of mobile internet transactions: algorithm, implementation and analysis
The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, int...
Shashi Anand, Krithi Ramamritham