Sciweavers

333 search results - page 53 / 67
» Computation with Absolutely No Space Overhead
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 11 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
GRAPHICSINTERFACE
2007
13 years 11 months ago
Adapting wavelet compression to human motion capture clips
Motion capture data is an effective way of synthesizing human motion for many interactive applications, including games and simulations. A compact, easy-to-decode representation i...
Philippe Beaudoin, Pierre Poulin, Michiel van de P...
DAC
2005
ACM
14 years 10 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
SIGSOFT
2003
ACM
14 years 10 months ago
A family of test adequacy criteria for database-driven applications
Although a software application always executes within a particular environment, current testing methods have largely ignored these environmental factors. Many applications execut...
Gregory M. Kapfhammer, Mary Lou Soffa
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
14 years 4 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis