Sciweavers

2125 search results - page 295 / 425
» Points with Type-2 Operations
Sort
View
ISCAS
2003
IEEE
113views Hardware» more  ISCAS 2003»
14 years 3 months ago
Optimum word length allocation for multipliers of integer DCT
Recently, the integer DCT (Int-DCT), which has the rounding operations in the lifting structure, is attracting many researchers' attention as an effective method for DCT base...
Masahiro Iwahashi, Osamu Nishida, Somchart Chokcha...
ISSRE
2003
IEEE
14 years 3 months ago
Assessing Uncertainty in Reliability of Component-Based Software Systems
Many architecture–based software reliability models were proposed in the past. Regardless of the accuracy of these models, if a considerable uncertainty exists in the estimates ...
Katerina Goseva-Popstojanova, Sunil Kamavaram
LICS
2003
IEEE
14 years 3 months ago
Labelled Markov Processes: Stronger and Faster Approximations
This paper reports on and discusses three notions of approximation for Labelled Markov Processes that have been developed last year. The three schemes are improvements over former...
Vincent Danos, Josee Desharnais
SRDS
2003
IEEE
14 years 3 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
WCRE
2003
IEEE
14 years 3 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte