Sciweavers

9806 search results - page 1894 / 1962
» Engineering adaptive requirements
Sort
View
ACIVS
2008
Springer
15 years 8 months ago
Crowd Behavior Recognition for Video Surveillance
Abstract. Crowd behavior recognition is becoming an important research topic in video surveillance for public places. In this paper, we first discuss the crowd feature selection a...
Shobhit Saxena, François Brémond, Mo...
ACSAC
2007
IEEE
15 years 8 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
CODES
2007
IEEE
15 years 8 months ago
Compile-time decided instruction cache locking using worst-case execution paths
Caches are notorious for their unpredictability. It is difficult or even impossible to predict if a memory access results in a definite cache hit or miss. This unpredictability i...
Heiko Falk, Sascha Plazar, Henrik Theiling
123
Voted
CODES
2007
IEEE
15 years 8 months ago
HW/SW co-design for Esterel processing
We present a co-synthesis approach that accelerates reactive software processing by moving the calculation of complex expressions into external combinational hardware. The startin...
Sascha Gädtke, Claus Traulsen, Reinhard von H...
CODES
2007
IEEE
15 years 8 months ago
Channel trees: reducing latency by sharing time slots in time-multiplexed networks on chip
Networks on Chip (NoC) have emerged as the design paradigm for scalable System on Chip communication infrastructure. A growing number of applications, often with firm (FRT) or so...
Andreas Hansson, Martijn Coenen, Kees Goossens
« Prev « First page 1894 / 1962 Last » Next »