Sciweavers

4349 search results - page 789 / 870
» A Comprehensive Process Model for Studying Software Process ...
Sort
View
ESORICS
2010
Springer
14 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
COMGEO
2007
ACM
14 years 9 months ago
A package for exact kinetic data structures and sweepline algorithms
In this paper we present a package for implementing exact kinetic data structures built on objects which move along polynomial trajectories. We discuss how the package design was ...
Daniel Russel, Menelaos I. Karavelas, Leonidas J. ...
EWC
2007
102views more  EWC 2007»
14 years 9 months ago
Interactive collision detection in three-dimensional visualizations of simulated construction operations
This paper presents research that led to the design and implementation of fast and interactive collision detection methods that can be used to identify and report undesirable conï¬...
Vineet R. Kamat, Julio C. Martínez
TCOM
2010
77views more  TCOM 2010»
14 years 4 months ago
Semi-Analytical Performance Prediction Methods for Iterative MMSE-IC Multiuser MIMO Joint Decoding
In this paper, two semi-analytical performance prediction methods are proposed and compared for multiuser MIMO transmission over block-fading multipath channels and iterative MMSE...
Raphaël Visoz, Antoine O. Berthet, Massinissa...
TCAD
2010
168views more  TCAD 2010»
14 years 4 months ago
An MILP-Based Performance Analysis Technique for Non-Preemptive Multitasking MPSoC
For real-time applications, it is necessary to estimate the worst-case performance early in the design process without actual hardware implementation. While the non-preemptive task...
Hoeseok Yang, Sungchan Kim, Soonhoi Ha