Sciweavers

3801 search results - page 574 / 761
» An Approach to Modeling Software Safety
Sort
View
CODES
2009
IEEE
15 years 11 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
AUIC
2006
IEEE
15 years 10 months ago
A markerless registration method for augmented reality based on affine properties
This paper presents a markerless registration approach for Augmented Reality (AR) systems based on the Kanade-Lucas-Tomasi (KLT) natural feature tracker and the affine reconstruct...
Y. Pang, M. L. Yuan, Andrew Y. C. Nee, Soh-Khim On...
COMPSAC
2006
IEEE
15 years 10 months ago
A Communication Virtual Machine
The convergence of data, voice and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enrich...
Yi Deng, Seyed Masoud Sadjadi, Peter J. Clarke, Ch...
ISPASS
2006
IEEE
15 years 10 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
SIGCSE
2005
ACM
179views Education» more  SIGCSE 2005»
15 years 10 months ago
Design patterns for database pedagogy: a proposal
Courses in Relational Databases largely use a domain-specific design approach different from that used in the rest of the curriculum. Use of the Unified Process, UML, and Design P...
Thomas J. Marlowe, Cyril S. Ku, James W. Benham