Sciweavers

544 search results - page 75 / 109
» Using Architectural Models to Predict the Maintainability of...
Sort
View
JAR
2006
103views more  JAR 2006»
13 years 8 months ago
A Framework for Verifying Bit-Level Pipelined Machines Based on Automated Deduction and Decision Procedures
We describe an approach to verifying bit-level pipelined machine models using a combination of deductive reasoning and decision procedures. While theorem proving systems such as AC...
Panagiotis Manolios, Sudarshan K. Srinivasan
IEEEARES
2006
IEEE
14 years 2 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Optimal configuration of hash table based multimedia fingerprint databases using weak bits
The increasingly large amount of digital multimedia content has created a need for technologies to search and identify multimedia files. Multimedia fingerprinting has been widely ...
Claus Bauer, Regunathan Radhakrishnan, Wenyu Jiang
HICSS
2006
IEEE
179views Biometrics» more  HICSS 2006»
14 years 2 months ago
e-Government Integration with Web Services and Alerts: A Case Study on an Emergency Route Advisory System in Hong Kong
Quick and efficient response to emergency is important for every city. This depends on the quality of the dispatch of emergency service to the scene and back to hospital or other ...
Cherrie W. W. Ng, Dickson K. W. Chiu
JUCS
2010
162views more  JUCS 2010»
13 years 7 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...