Sciweavers

135 search results - page 23 / 27
» Assessing the Quality of Large, Software-Intensive Systems: ...
Sort
View
CCS
2003
ACM
14 years 23 days ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
CASSIS
2004
Springer
13 years 11 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
HICSS
2010
IEEE
199views Biometrics» more  HICSS 2010»
14 years 2 months ago
Software Entropy in Agile Product Evolution
As agile software development principles and methods are being adopted by large software product organizations it is important to understand the role of software entropy. That is,...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...
ISCAS
2008
IEEE
85views Hardware» more  ISCAS 2008»
14 years 1 months ago
Frame-parallel design strategy for high definition B-frame H.264/AVC encoder
High Definition (HD) H.264/AVC video compression is the emerging necessity on nowadays home entertainment environment and so on. However, Although B-frame coding scheme provides ...
Yi-Hau Chen, Tzu-Der Chuang, Yu-Han Chen, Chen-Han...
ICC
2007
IEEE
168views Communications» more  ICC 2007»
13 years 11 months ago
Centralized Radio Resource Allocation for OFDMA Cellular Systems
Efficient resource allocation in cellular OFDMA systems envisages the assignment of the number of subcarriers and the relative transmission format on the basis of the experimented ...
Andrea Abrardo, Alessandro Alessio, Paolo Detti, M...