Sciweavers

7080 search results - page 530 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
134
Voted
FPLAY
2008
15 years 6 months ago
Using conflict theory to model complex societal interactions
Conflict theory can be used to explain the interactions between societies during times of turmoil and change (i.e. revolutions, strikes or everyday debates). Games have been produ...
Ben Medler, Joe Fitzgerald, Brian Magerko
CL
2008
Springer
15 years 5 months ago
Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Pao-Ann Hsiung, Shang-Wei Lin
AMR
2005
Springer
100views Multimedia» more  AMR 2005»
15 years 10 months ago
Using Segmented Objects in Ostensive Video Shot Retrieval
This paper presents a system for video shot retrieval in which shots are retrieved based on matching video objects using a combination of colour, shape and texture. Rather than mat...
Sorin Sav, Hyowon Lee, Alan F. Smeaton, Noel E. O'...
DAC
1995
ACM
15 years 8 months ago
Performance Analysis of Embedded Software Using Implicit Path Enumeration
—Embedded computer systems are characterized by the presence of a processor running application-specific dedicated software. A large number of these systems must satisfy real-ti...
Yau-Tsun Steven Li, Sharad Malik
DATE
2003
IEEE
96views Hardware» more  DATE 2003»
15 years 10 months ago
A System to Validate and Certify Soft and Hard IP
With the increasing use of Intellectual Property (IP) in the semiconductor industry, the demand to verify IP for quality is high. This paper describes ipscreen, a software tool th...
Bernard Laurent, Thierry Karger