Sciweavers

7189 search results - page 1263 / 1438
» Connecting Design with Code
Sort
View
SIGSOFT
2010
ACM
15 years 1 months ago
Speculative analysis: exploring future development states of software
Most software tools and environments help developers analyze the present and past development states of their software systems. Few approaches have investigated the potential cons...
Yuriy Brun, Reid Holmes, Michael D. Ernst, David N...
USS
2010
15 years 1 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
160
Voted
WD
2010
15 years 1 months ago
Efficient MCS selection for MBSFN transmissions over LTE networks
Long Term Evolution (LTE), the next-generation network beyond 3G, is designed to support the explosion in demand for bandwidth-hungry multimedia services that are already experienc...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
157
Voted
APSEC
2009
IEEE
15 years 1 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
DPHOTO
2009
129views Hardware» more  DPHOTO 2009»
15 years 1 months ago
Extended depth-of-field using sharpness transport across color channels
In this paper we present an approach to extend the Depth-of-Field (DoF) for cell phone miniature camera by concurrently optimizing optical system and post-capture digital processi...
Frederic Guichard, Hoang-Phi Nguyen, Régis ...
« Prev « First page 1263 / 1438 Last » Next »