Sciweavers

2192 search results - page 230 / 439
» Embedded function composition
Sort
View
JMM2
2007
118views more  JMM2 2007»
15 years 2 months ago
Universal Detection of JPEG Steganography
Abstract— In this paper, we present a novel universal approach which consists in exploring statistics in the compressed frequency domain. This approach is motivated by two main c...
Johann Barbier, Eric Filiol, Kichenakoumar Mayoura
PRL
2010
130views more  PRL 2010»
15 years 17 days ago
Automatic configuration of spectral dimensionality reduction methods
In this paper, our main contribution is a framework for the automatic configuration of any spectral dimensionality reduction methods. This is achieved, first, by introducing the m...
Michal Lewandowski, Dimitrios Makris, Jean-Christo...
164
Voted
CSREAESA
2010
15 years 5 days ago
The First Clock Cycle Is A Real BIST
The primary goal of Built-In Self-Test (BIST) for Field Programmable Gate Arrays (FPGAs) is to completely test all programmable logic and routing resources in the device such that ...
Charles E. Stroud, Bradley F. Dutton
EMSOFT
2010
Springer
15 years 5 days ago
Load-based schedulability analysis of certifiable mixed-criticality systems
Many safety-critical embedded systems are subject to certification requirements. However, only a subset of the functionality of the system may be safety-critical and hence subject...
Haohan Li, Sanjoy K. Baruah
SIGSOFT
2010
ACM
15 years 23 hour ago
Golden implementation driven software debugging
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...