Sciweavers

1548 search results - page 173 / 310
» Estimating Software Vulnerabilities
Sort
View
BIS
2009
107views Business» more  BIS 2009»
15 years 22 days ago
Framework for Value Prediction of Knowledge-Based Applications
Knowledge-based applications are characterized by their use of machine-understandable formalizations of expert knowledge. Complex knowledge structures, and the features which explo...
Ali Imtiaz, Tobias Bürger, Igor O. Popov, Ele...
CISS
2008
IEEE
15 years 6 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
EUROMICRO
2002
IEEE
15 years 4 months ago
Evaluation of Static Properties for Component-Based Architectures
Early assessment of the non-functional properties of component compositions is one of the hottest issues in component-based architecting. We describe a method for evaluating the e...
Alexandre V. Fioukov, Evgeni M. Eskenazi, Dieter K...
JSS
2006
134views more  JSS 2006»
14 years 11 months ago
An agent based synchronization scheme for multimedia applications
Synchronization of multimedia streams is one of the important issue in multimedia communications. In this paper, we propose an adaptive synchronization agency for synchronization ...
Sunilkumar S. Manvi, P. Venkataram
ASPDAC
2010
ACM
151views Hardware» more  ASPDAC 2010»
14 years 9 months ago
Source-level timing annotation for fast and accurate TLM computation model generation
This paper proposes a source-level timing annotation method for generation of accurate transaction level models for software computation modules. While Transaction Level Modeling ...
Kai-Li Lin, Chen Kang Lo, Ren-Song Tsay