Sciweavers

245 search results - page 8 / 49
» Code Generation for Streaming: An Access Execute Mechanism
Sort
View
EJWCN
2010
119views more  EJWCN 2010»
14 years 7 months ago
Embedding Protection Inside H.264/AVC and SVC Streams
into the H.264 bitstream of supplementary network abstraction layer (NAL) units that contain forward error-correction (FEC) data generated by a block error-correction code. The pro...
Catherine Lamy-Bergot, Benjamin Gadat
ISORC
2007
IEEE
15 years 6 months ago
An Approach to Automated Agent Deployment in Service-Based Systems
In service-based systems, services from various providers can be integrated following specific workflows to achieve users’ goals. These workflows are often executed and coordina...
Stephen S. Yau, Luping Zhu, Dazhi Huang, Haishan G...
ASPDAC
2006
ACM
124views Hardware» more  ASPDAC 2006»
15 years 6 months ago
Functional modeling techniques for efficient SW code generation of video codec applications
–Architectures with multiple programmable cores are becoming more attractive for video codec applications because they can provide highly concurrent computation and support multi...
Sang-Il Han, Soo-Ik Chae, Ahmed Amine Jerraya
JSA
2000
175views more  JSA 2000»
15 years 4 days ago
Complete worst-case execution time analysis of straight-line hard real-time programs
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
Friedhelm Stappert, Peter Altenbernd
90
Voted
RAID
2005
Springer
15 years 5 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...