Sciweavers

3256 search results - page 640 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
SAC
2010
ACM
14 years 2 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
PLDI
2004
ACM
14 years 25 days ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
DCC
2000
IEEE
13 years 11 months ago
Multi-Resolution Adaptation of the SPIHT Algorithm for Multiple Description
Multiple description codes are data compression algorithms designed with the goal of minimizing the distortion caused by data loss in packet-based or diversity communications syst...
Nedeljko Varnica, Michael Fleming, Michelle Effros
VISUALIZATION
1997
IEEE
13 years 11 months ago
Volume rendering of abdominal aortic aneurysms
Volume rendering is a valuable and important technique for scientific visualization. One well known application area is the reconstruction and visualization of output from medica...
Roger C. Tam, Christopher G. Healey, Borys Flak, P...
WCE
2007
13 years 8 months ago
High energy white beam x-ray diffraction studies of residual strains in engineering components
— In order to predict the durability of engineering components and improve performance, it is mandatory to understand residual stresses. The last decade has witnessed a significa...
Shu Yan Zhang, Willem J. J. Vorster, Tea-Sung Jun,...