Sciweavers

2272 search results - page 157 / 455
» Validity Invariants and Effects
Sort
View
FPL
2009
Springer
113views Hardware» more  FPL 2009»
14 years 2 months ago
Clock duplicity for high-precision timestamping in Gigabit Ethernet
Hardware-timestamping is essential for achieving tight synchronization in networking applications. This mechanism is selectively used on few high-cost tailored systems. Actual μP...
Carles Nicolau, Dolors Sala, Enrique Cantó
RSP
1999
IEEE
131views Control Systems» more  RSP 1999»
14 years 2 months ago
Fast Prototyping: A Case Study - The JPEG Compression Algorithm
A platform and methodology for real time systems on chip prototyping is presented. The JPEG case study is presented as an example of prototyping. The proposed methodology overcome...
Sébastien Pillement, Lionel Torres, Michel ...
ACSAC
2007
IEEE
14 years 2 months ago
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection
This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Michael Meier, Ulrich Flegel, Sebastian Schmerl
ICDAR
2007
IEEE
14 years 2 months ago
Text-Independent Writer Identification and Verification on Offline Arabic Handwriting
In this paper, we evaluate the performance on Arabic handwriting of the text-independent writer identification methods that we developed and tested on Western script in recent yea...
Marius Bulacu, Lambert Schomaker, Axel Brink
GLOBECOM
2009
IEEE
14 years 2 months ago
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks
Abstract--We present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and countermeasures on MANETs. In particular, we focus on ...
André König, Daniel Seither, Ralf Stei...