Sciweavers

160 search results - page 18 / 32
» Selecting the best strategy in a software certification proc...
Sort
View
ACSC
2002
IEEE
14 years 19 days ago
Learning and the Reflective Journal in Computer Science
This paper describes the use of the reflective journal in a computer programming course at the University of South Australia. We describe rationale for the journal relating it to ...
S. E. George
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
13 years 12 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
JSAC
2006
128views more  JSAC 2006»
13 years 7 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
ASYNC
2002
IEEE
113views Hardware» more  ASYNC 2002»
14 years 19 days ago
A Dual-Mode Synchronous/Asynchronous CORDIC Processor
For application in a software defined radio a CORDIC processor has been developed that can operate both in synchronous and asynchronous mode. Each mode of operation has advantages...
Eckhard Grass, Bodhisatya Sarker, Koushik Maharatn...
ICIP
2007
IEEE
13 years 11 months ago
Computer-Aided Grading of Neuroblastic Differentiation: Multi-Resolution and Multi-Classifier Approach
In this paper, the development of a computer-aided system for the classification of grade of neuroblastic differentiation is presented. This automated process is carried out withi...
Jun Kong, Olcay Sertel, Hiroyuki Shimada, Kim L. B...