Sciweavers

970 search results - page 107 / 194
» Reliability Analysis of Concurrent Systems Using LTSA
Sort
View
PASTE
2010
ACM
13 years 11 months ago
Null dereference analysis in practice
Many analysis techniques have been proposed to determine when a potentially null value may be dereferenced. But we have observed in practice that not every potential null derefere...
Nathaniel Ayewah, William Pugh
MM
2009
ACM
163views Multimedia» more  MM 2009»
14 years 3 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
ICASSP
2010
IEEE
13 years 9 months ago
High-resolution glyph-inspection based security system
: © High-Resolution Glyph-Inspection Based Security System Steven J. Simske, Guy Adams HP Laboratories HPL-2010-42 Image forensics, CMOS imaging, authentication, print parasitics,...
Steven J. Simske, Guy Adams
PR
2008
239views more  PR 2008»
13 years 9 months ago
A real-time object detecting and tracking system for outdoor night surveillance
Autonomous video surveillance and monitoring has a rich history. Many deployed systems are able to reliably track human motion in indoor and controlled outdoor environments. Howev...
Kaiqi Huang, Liangsheng Wang, Tieniu Tan, Stephen ...
IPPS
1998
IEEE
14 years 1 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson