Sciweavers

2740 search results - page 442 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
IROS
2008
IEEE
247views Robotics» more  IROS 2008»
15 years 9 months ago
Automatic detection of checkerboards on blurred and distorted images
— Most of the existing camera calibration toolboxes require the observation of a checkerboard shown by the user at different positions and orientations. This paper presents an al...
Martin Rufli, Davide Scaramuzza, Roland Siegwart
KBSE
2008
IEEE
15 years 9 months ago
Test-Suite Augmentation for Evolving Software
One activity performed by developers during regression testing is test-suite augmentation, which consists of assessing the adequacy of a test suite after a program is modified an...
Raúl A. Santelices, Pavan Kumar Chittimalli...
123
Voted
AINA
2007
IEEE
15 years 9 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
COLCOM
2007
IEEE
15 years 9 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
115
Voted
DATE
2007
IEEE
145views Hardware» more  DATE 2007»
15 years 9 months ago
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508
This paper proposes an innovative methodology to perform and validate a Failure Mode and Effects Analysis (FMEA) at System-on-Chip (SoC) level. This is done in compliance with the...
Riccardo Mariani, Gabriele Boschi, Federico Colucc...