Sciweavers

2740 search results - page 442 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
IROS
2008
IEEE
247views Robotics» more  IROS 2008»
15 years 4 months ago
Automatic detection of checkerboards on blurred and distorted images
— Most of the existing camera calibration toolboxes require the observation of a checkerboard shown by the user at different positions and orientations. This paper presents an al...
Martin Rufli, Davide Scaramuzza, Roland Siegwart
KBSE
2008
IEEE
15 years 4 months ago
Test-Suite Augmentation for Evolving Software
One activity performed by developers during regression testing is test-suite augmentation, which consists of assessing the adequacy of a test suite after a program is modified an...
Raúl A. Santelices, Pavan Kumar Chittimalli...
AINA
2007
IEEE
15 years 4 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
COLCOM
2007
IEEE
15 years 4 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
DATE
2007
IEEE
145views Hardware» more  DATE 2007»
15 years 4 months ago
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508
This paper proposes an innovative methodology to perform and validate a Failure Mode and Effects Analysis (FMEA) at System-on-Chip (SoC) level. This is done in compliance with the...
Riccardo Mariani, Gabriele Boschi, Federico Colucc...