Sciweavers

1270 search results - page 147 / 254
» IF Validation Environment Tutorial
Sort
View
CASSIS
2005
Springer
14 years 4 months ago
Romization: Early Deployment and Customization of Java Systems for Constrained Devices
Memory is one of the scarcest resource of embedded and constrained devices. This paper studies the memory footprint benefit of pre-deploying embedded Java systems up to their acti...
Alexandre Courbot, Gilles Grimaud, Jean-Jacques Va...
AFRIGRAPH
2004
ACM
14 years 4 months ago
A local model of eye adaptation for high dynamic range images
In the real world, the human eye is confronted with a wide range of luminances from bright sunshine to low night light. Our eyes cope with this vast range of intensities by adapta...
Patrick Ledda, Luís Paulo Santos, Alan Chal...
RAID
2004
Springer
14 years 4 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
WCRE
2003
IEEE
14 years 4 months ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
DSN
2002
IEEE
14 years 3 months ago
Pinpoint: Problem Determination in Large, Dynamic Internet Services
Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today’s large, distributed, and dynamic application e...
Mike Y. Chen, Emre Kiciman, Eugene Fratkin, Armand...