Sciweavers

971 search results - page 103 / 195
» Comparative Analysis of Arithmetic Coding Computational Comp...
Sort
View
122
Voted
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 6 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
148
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
115
Voted
ICIAP
2001
Springer
16 years 2 months ago
2D Shape Recognition by Hidden Markov Models
In Computer Vision, two-dimensional shape classifcation is a complex and well studied topic, often basic for three-dimensional object recognition. Object contours are a widely cho...
Manuele Bicego, Vittorio Murino
PE
2002
Springer
111views Optimization» more  PE 2002»
15 years 2 months ago
Forwarders vs. centralized server: an evaluation of two approaches for locating mobile agents
This paper evaluates and compares the performance of two approaches for locating an agent in a mobile agent environment. The first approach dynamically creates a chain of forwarde...
Sara Alouf, Fabrice Huet, Philippe Nain
122
Voted
RTS
2011
123views more  RTS 2011»
14 years 9 months ago
Feasibility analysis under fixed priority scheduling with limited preemptions
—Preemptive scheduling often generates a significant runtime overhead that may increase task worst-case execution times up to 40%, with respect to a fully non preemptive executi...
Gang Yao, Giorgio C. Buttazzo, Marko Bertogna