Sciweavers

172 search results - page 19 / 35
» A classification of design steps and their verification
Sort
View
CONEXT
2006
ACM
15 years 1 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
89
Voted
WSCG
2004
163views more  WSCG 2004»
14 years 11 months ago
Fairing of Polygon Meshes Via Bayesian Discriminant Analysis
Design of an anisotropic diffusion-based filter that performs Bayesian classification for automatic selection of a proper weight for fairing polygon meshes is proposed. The data a...
Chun-Yen Chen, Kuo-Young Cheng, Hong-Yuan Mark Lia...
MSWIM
2006
ACM
15 years 3 months ago
An efficient multicast packet delivery scheme for UMTS
In this paper we present an efficient scheme for the multicast transmission of the data in the Universal Mobile Telecommunications System (UMTS). We take advantage of the tree top...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
PEWASUN
2008
ACM
14 years 11 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...
TCAD
2008
114views more  TCAD 2008»
14 years 9 months ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...