Sciweavers

9316 search results - page 218 / 1864
» Analysis of traceback techniques
Sort
View
EMSOFT
2006
Springer
15 years 6 months ago
Reusable models for timing and liveness analysis of middleware for distributed real-time and embedded systems
Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Formal tools ...
Venkita Subramonian, Christopher D. Gill, Cé...
ECR
2006
107views more  ECR 2006»
15 years 4 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
TON
2008
79views more  TON 2008»
15 years 4 months ago
A stochastic foundation of available bandwidth estimation: multi-hop analysis
This paper analyzes the asymptotic behavior of packet-train probing over a multi-hop network path carrying arbitrarily routed bursty cross-traffic flows. We examine the statistical...
Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Logu...
TVCG
2010
122views more  TVCG 2010»
15 years 2 months ago
Analysis of Recurrent Patterns in Toroidal Magnetic Fields
—In the development of magnetic confinement fusion which will potentially be a future source for low cost power, physicists must be able to analyze the magnetic field that con...
Allen R. Sanderson, Guoning Chen, Xavier Tricoche,...
BMVC
2010
15 years 2 months ago
Graph-based Analysis of Textured Images for Hierarchical Segmentation
The Texture Fragmentation and Reconstruction (TFR) algorithm has been recently introduced [9] to address the problem of image segmentation by textural properties, based on a suita...
Raffaele Gaetano, Giuseppe Scarpa, Tamás Sz...