Sciweavers

2233 search results - page 305 / 447
» On the Complexity of Theory Curbing
Sort
View
ICDCS
2007
IEEE
14 years 2 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
IJCNN
2007
IEEE
14 years 2 months ago
Philosophical Aspects of Neural, Probabilistic and Fuzzy Modeling of Language Use and Translation
— Serious efforts to develop computerized systems for natural language understanding and machine translation have taken place for more than half a century. Some successful system...
Timo Honkela
ISCAS
2007
IEEE
84views Hardware» more  ISCAS 2007»
14 years 2 months ago
System Bandwidth Analysis of Multiview Video Coding with Precedence Constraint
— Multiview video coding (MVC) systems require much more bandwidth and computational complexity relative to mono-view video systems. Thus, when designing a VLSI architecture for ...
Pei-Kuei Tsung, Li-Fu Ding, Wei-Yin Chen, Shao-Yi ...
MEMOCODE
2007
IEEE
14 years 2 months ago
Towards Equivalence Checking Between TLM and RTL Models
The always increasing complexity of digital system is overcome in design flows based on Transaction Level Modeling (TLM) by designing and verifying the system at difbstraction le...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli...
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
On Adjusting Power to Defend Wireless Networks from Jamming
— Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the n...
Wenyuan Xu