Sciweavers

1448 search results - page 182 / 290
» From Requirements to Code Revisited
Sort
View
166
Voted
CL
2008
Springer
15 years 3 months ago
Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Pao-Ann Hsiung, Shang-Wei Lin
121
Voted
JPDC
2006
103views more  JPDC 2006»
15 years 3 months ago
Fractal: A mobile code-based framework for dynamic application protocol adaptation
The rapid growth of heterogeneous devices and diverse networks in our daily life, makes it is very difficult, if not impossible, to build a one-size-fits-all application or protoc...
Hanping Lufei, Weisong Shi
139
Voted
MTA
2007
140views more  MTA 2007»
15 years 3 months ago
Motion mapping and mode decision for MPEG-2 to H.264/AVC transcoding
This paper describes novel transcoding techniques aimed for low-complexity MPEG-2 to H.264/AVC transcoding. An important application for this type of conversion is efficient stor...
Jun Xin, Jianjun Li, Anthony Vetro, Shun-ichi Seki...
150
Voted
TIT
2010
128views Education» more  TIT 2010»
14 years 10 months ago
Shannon-theoretic limits on noisy compressive sampling
In this paper, we study the number of measurements required to recover a sparse signal in M with L nonzero coefficients from compressed samples in the presence of noise. We conside...
Mehmet Akçakaya, Vahid Tarokh
160
Voted
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
16 years 4 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov