Sciweavers

2468 search results - page 339 / 494
» Collaborative architecture design and evaluation
Sort
View
133
Voted
MOBIHOC
2009
ACM
16 years 4 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
SCIA
2009
Springer
146views Image Analysis» more  SCIA 2009»
15 years 10 months ago
Extraction of Windows in Facade Using Kernel on Graph of Contours
In the past few years, street-level geoviewers has become a very popular web-application. In this paper, we focus on a first urban concept which has been identified as useful for...
Jean-Emmanuel Haugeard, Sylvie Philipp-Foliguet, F...
119
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ISSS
2002
IEEE
139views Hardware» more  ISSS 2002»
15 years 8 months ago
Multiprocessor Mapping of Process Networks: A JPEG Decoding Case Study
We present a system-level design and programming method for embedded multiprocessor systems. The aim of the method is to improve the design time and design quality by providing a ...
Erwin A. de Kock
CAL
2006
15 years 3 months ago
Performance modeling using Monte Carlo simulation
Abstract-- Cycle accurate simulation has long been the primary tool for micro-architecture design and evaluation. Though accurate, the slow speed often imposes constraints on the e...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck