Sciweavers

2272 search results - page 213 / 455
» Validity Invariants and Effects
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 4 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
PRDC
2005
IEEE
14 years 4 months ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
WIOPT
2005
IEEE
14 years 4 months ago
Modular Analytical Performance Models for Ad Hoc Wireless Networks
Wireless ad hoc networks raised a series of challenging research tracks. In order to analyze and validate research results achieved, thorough performance evaluation efforts are ne...
Fernando Luís Dotti, Paulo Fernandes, Afons...
PEWASUN
2005
ACM
14 years 4 months ago
Real-time perceptual QoS satisfactions of multimedia information
Multimedia contents are becoming the major information going through the Internet. Pervasive network infrastructure expedites data delivery with improved network throughput and re...
Ka Lun Eddie Law, Sunny So
EMSOFT
2005
Springer
14 years 4 months ago
SHIM: a deterministic model for heterogeneous embedded systems
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
Stephen A. Edwards, Olivier Tardieu