Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Metamodels are functions with calibrated parameters, used actions and simplifications of the simulation model. A metamodel exposes the system’s input-output relationship and ca...
A method is proposed to encode multiple regions of interest in the JPEG2000 image-coding framework. The algorithm is based on the rearrangement of packets in the code-stream to pl...
For headphone-based spatial auditory display systems, binaural synthesis of sound localization cues typically use source reproduction level as the primary control for source range...