Sciweavers

1448 search results - page 24 / 290
» From Requirements to Code Revisited
Sort
View
ISSS
1999
IEEE
151views Hardware» more  ISSS 1999»
13 years 12 months ago
Optimized System Synthesis of Complex RT Level Building Blocks from Multirate Dataflow Graphs
In order to cope with the ever increasing complexity of todays application specific integrated circuits, a building block based design methodology is established. The system is co...
Jens Horstmannshoff, Heinrich Meyr
IWPC
2006
IEEE
14 years 1 months ago
An Approach for Extracting Workflows from E-Commerce Applications
For many enterprises, reacting to fast changes to their business process is key to maintaining their competitive edge in the market. However, developers often must manually locate...
Ying Zou, Maokeng Hung
ICASSP
2011
IEEE
12 years 11 months ago
Efficient context adaptive entropy coding for real-time applications
Context based entropy coding has the potential to provide higher gain over memoryless entropy coding. However serious difficulties arise regarding the practical implementation in...
Guillaume Fuchs, Vignesh Subbaraman, Markus Multru...
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 7 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...
CAV
2012
Springer
334views Hardware» more  CAV 2012»
11 years 10 months ago
Joogie: Infeasible Code Detection for Java
We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible controlflow paths and thus has no feasible executi...
Stephan Arlt, Martin Schäf