Sciweavers

2740 search results - page 335 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
148
Voted
ISCC
1999
IEEE
111views Communications» more  ISCC 1999»
15 years 8 months ago
Towards TCP-Friendly Adaptive Multimedia Applications Based on RTP
For multimedia senders to benefit the most of dynamically changing availability of network resources they need to adjust their transmission behavior in accordance with the network...
Dorgham Sisalem, Adam Wolisz
111
Voted
ICCAD
1996
IEEE
102views Hardware» more  ICCAD 1996»
15 years 7 months ago
Bit-flipping BIST
A scan-based BIST scheme is presented which guarantees complete fault coverage with very low hardware overhead. A probabilistic analysis shows that the output of an LFSR which fee...
Hans-Joachim Wunderlich, Gundolf Kiefer
116
Voted
FPGA
1997
ACM
124views FPGA» more  FPGA 1997»
15 years 7 months ago
A FPGA-Based Implementation of a Fault-Tolerant Neural Architecture for Photon Identification
Event identification in photon counting ICCD detectors requires a high level image analysis which cannot be easily described algorithmically: neural networks are promising to appr...
Monica Alderighi, E. L. Gummati, Vincenzo Piuri, G...
131
Voted
SEE
1997
Springer
15 years 7 months ago
An environment for object-oriented real-time systems design
A concise object-oriented method for the development of real-time systems has been composed. Hardware components are modelled by (sofnuare) base objects; base objects are controll...
Rob L. W. van de Weg, Rolf Engmann, Raoul van de H...
141
Voted
ACSC
2007
IEEE
15 years 7 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...