Sciweavers

1940 search results - page 99 / 388
» Dependable Software: An Oxymoron
Sort
View
ICASSP
2008
IEEE
14 years 3 months ago
Iterative R-D optimization of H.264
In this paper, we apply the primal-dual decomposition and subgradient projection methods to solve the rate-distortion optimization problem with the constant bit rate constraint. T...
Cheolhong An, Truong Q. Nguyen
ICECCS
2007
IEEE
111views Hardware» more  ICECCS 2007»
14 years 24 days ago
A Refinement Driven Component-Based Design
Modern software applications ranging from enterprise to embedded systems are becoming increasingly complex, and require very high levels of dependability assurance. The most effec...
Zhenbang Chen, Zhiming Liu, Volker Stolz, Lu Yang,...
TIP
2008
109views more  TIP 2008»
13 years 8 months ago
Iterative Rate-Distortion Optimization of H.264 With Constant Bit Rate Constraint
In this paper, we apply the primal-dual decomposition and subgradient projection methods to solve the rate-distortion optimization problem with the constant bit rate constraint. Th...
Cheolhong An, Truong Q. Nguyen
ARCS
2010
Springer
14 years 3 months ago
Exploiting Inactive Rename Slots for Detecting Soft Errors
Register renaming is a widely used technique to remove false data dependencies in superscalar datapaths. Rename logic consists of a table that holds a physical register mapping for...
Mehmet Kayaalp, Oguz Ergin, Osman S. Ünsal, M...
COMPUTER
1998
131views more  COMPUTER 1998»
13 years 8 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa