Sciweavers

360 search results - page 40 / 72
» A Method for the Verification of Haptic Algorithms
Sort
View
WWW
2004
ACM
15 years 10 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
ICMCS
2006
IEEE
179views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Optimizing Algorithms for Region-of-Interest Video Compression, with Application to Mobile Telehealth
Wireless communication of video poses constraints on information capacity. Region-of-Interest (ROI) video coding provides higher quality in the ROI, but poorer quality in the back...
Sira Rao, Nikil Jayant
FMCAD
2008
Springer
14 years 11 months ago
Word-Level Sequential Memory Abstraction for Model Checking
el Sequential Memory Abstraction for Model Checking Per Bjesse Advanced Technology Group Synopsys Inc. Many designs intermingle large memories with wide data paths and nontrivial c...
Per Bjesse
TWC
2010
14 years 4 months ago
Closed-Loop Transmit Diversity with Imperfect Feedback
The closed-loop transmit diversity technique is used to improve the performance of the downlink channel in MIMO communication systems. In these closed-loop systems, feedback delay...
A. Heidari, Amir K. Khandani
INFSOF
2006
103views more  INFSOF 2006»
14 years 10 months ago
Improving test quality using robust unique input/output circuit sequences (UIOCs)
In finite state machine (FSM) based testing, the problem of fault masking in the unique input/output (UIO) sequence may degrade the test performance of the UIO based methods. This...
Qiang Guo, Robert M. Hierons, Mark Harman, Karnig ...