Sciweavers

3828 search results - page 739 / 766
» Proof-Based System Engineering Using a Virtual System Model
Sort
View
CODES
2007
IEEE
14 years 2 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...
CODES
2007
IEEE
14 years 2 months ago
HySim: a fast simulation framework for embedded software development
Instruction Set Simulation (ISS) is widely used in system evaluation and software development for embedded processors. Despite the significant advancements in the ISS technology,...
Stefan Kraemer, Lei Gao, Jan Weinstock, Rainer Leu...
SEKE
2007
Springer
14 years 1 months ago
TRAP.NET: A Realization of Transparent Shaping in .NET
We define adaptability as the capacity of software in adjusting its behavior in response to changing conditions. To list just a few examples, adaptability is important in pervasiv...
Seyed Masoud Sadjadi, Fernando Trigoso
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
SIGMETRICS
2006
ACM
168views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Throughput performance of popular JMS servers
The Java Messaging Service (JMS) facilitates communication among distributed software components according to the publish/subscribe principle. If the subscribers install filter r...
Michael Menth, Robert Henjes, Christian Zepfel, Se...