Sciweavers

6846 search results - page 1301 / 1370
» Developing an Active Observer
Sort
View
DAC
2005
ACM
14 years 11 months ago
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design
In many of embedded systems, particularly for those with high data computations, the delay of memory access is one of the major bottlenecks in the system's performance. It ha...
Jungeun Kim, Taewhan Kim
DAC
2006
ACM
14 years 11 months ago
Timing-based delay test for screening small delay defects
The delay fault test pattern set generated by timing unaware commercial ATPG tools mostly affects very short paths, thereby increasing the escape chance of smaller delay defects. ...
Nisar Ahmed, Mohammad Tehranipoor, Vinay Jayaram
SIGSOFT
2004
ACM
14 years 10 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
ISBI
2008
IEEE
14 years 10 months ago
Monte Carlo assessment of time-of-flight benefits on the LYSO-based discovery RX PET/CT scanner
Time-Of-Flight (TOF) positron emission tomography (PET) was studied and preliminarily developed in the 80s, but the lack of a scintillator able to deliver proper time resolution a...
Parham Geramifar, Mohammad Reza Ay, Mojtaba Shamsa...
WWW
2009
ACM
14 years 10 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
« Prev « First page 1301 / 1370 Last » Next »