Sciweavers

108 search results - page 8 / 22
» re 2010
Sort
View
RE
2010
Springer
13 years 5 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson
RE
2010
Springer
13 years 5 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
DATE
2010
IEEE
174views Hardware» more  DATE 2010»
13 years 8 months ago
An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusio
The H.264/AVC video encoder standard significantly improves the compression efficiency by using variable block-sized Inter (P) and Intra (I) Macroblock (MB) coding modes. In this p...
Muhammad Shafique, Bastian Molkenthin, Jörg H...
ICASSP
2010
IEEE
13 years 10 months ago
Automatic matched filter recovery via the audio camera
The sound reaching the acoustic sensor in a realistic environment contains not only the part arriving directly from the sound source but also a number of environmental re ections....
Adam O'Donovan, Ramani Duraiswami, Dmitry N. Zotki...
TDP
2010
88views more  TDP 2010»
13 years 5 months ago
P-Sensitive K-Anonymity with Generalization Constraints
Numerous privacy models based on the kanonymity property and extending the kanonymity model have been introduced in the last few years in data privacy re search: ldiversity, psen...
Alina Campan, Traian Marius Truta, Nicholas Cooper