Sciweavers

342 search results - page 57 / 69
» Reuse, Standardization, and Transformation of Requirements
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
14 years 1 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
SCAM
2008
IEEE
14 years 1 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
SOSE
2008
IEEE
14 years 1 months ago
Precise Steps for Choreography Modeling for SOA Validation and Verification
Service-oriented architecture (SOA) enables organizations to transform their existing IT infrastructure into a more flexible business process platform.. In this architecture, deco...
Sebastian Wieczorek, Andreas Roth, Alin Stefanescu...
ICMCS
2007
IEEE
122views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Generating Video Sequence from Photo Image for Mobile Screens by Content Analysis
To bridge the gap between the high resolution digital images and limited display capability of mobile devices, this paper proposes a method to automatically transform static image...
Shuqiang Jiang, Huiying Liu, Zhao Zhao, Qingming H...
SAS
2007
Springer
106views Formal Methods» more  SAS 2007»
14 years 1 months ago
Guided Static Analysis
In static analysis, the semantics of the program is expressed as a set ions. The equations are solved iteratively over some abstract domain. If ract domain is distributive and sati...
Denis Gopan, Thomas W. Reps