Sciweavers

410 search results - page 65 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
JCIT
2010
146views more  JCIT 2010»
13 years 3 months ago
Determing Performance of Choreography-based Composite Services
Web Service Choreography Description Language is a main-stream standard for the description of peer-to-peer collaborations for the participants for service composition. To predict...
Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang
CGO
2010
IEEE
14 years 3 months ago
Towards program optimization through automated analysis of numerical precision
Reducing the arithmetic precision of a computation has real performance implications, including increased speed, decreased power consumption, and a smaller memory footprint. For s...
Michael D. Linderman, Matthew Ho, David L. Dill, T...
VL
2008
IEEE
115views Visual Languages» more  VL 2008»
14 years 3 months ago
Flexible visualization of automatic simulation based on structured graph transformation
Visual modeling languages for discrete behavior modeling allow the modeler to describe how systems develop over time during system runs. Models of these languages are the basis fo...
Enrico Biermann, Claudia Ermel, Jonas Hurrelmann, ...
DATE
2007
IEEE
110views Hardware» more  DATE 2007»
14 years 3 months ago
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis
Abstract— Modern integrated radio systems require highly linear analog/RF circuits. Two-tone simulations are commonly used to study a circuit’s nonlinear behavior. Very often, ...
Jonathan Borremans, Ludwig De Locht, Piet Wambacq,...
INFOCOM
2007
IEEE
14 years 3 months ago
Balancing Interruption Frequency and Buffering Penalties in VBR Video Streaming
—The main goal of a streaming application is to enable the successful decoding of each video object before its displaying deadline is violated, and to recover from a deadline vio...
Guanfeng Liang, Ben Liang