Sciweavers

759 search results - page 127 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
ICRE
1998
IEEE
13 years 12 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
CAD
2006
Springer
13 years 7 months ago
Incremental reconstruction of sharp edges on mesh surfaces
Limited by the regular grids in computing, many modelling approaches (e.g., field-based methods) sample 3D shape insensitive to sharp features therefore exhibit aliasing errors, b...
Charlie C. L. Wang
TCOM
2008
110views more  TCOM 2008»
13 years 7 months ago
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
We consider cross-layer adaptive transmission for a single-user system with stochastic data traffic and a timevarying wireless channel. The objective is to vary the transmit power ...
Anh Tuan Hoang, Mehul Motani
IEEEPACT
2009
IEEE
13 years 5 months ago
ITCA: Inter-task Conflict-Aware CPU Accounting for CMPs
Abstract--Chip-MultiProcessor (CMP) architectures are becoming more and more popular as an alternative to the traditional processors that only extract instruction-level parallelism...
Carlos Luque, Miquel Moretó, Francisco J. C...
USS
2010
13 years 5 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...