Sciweavers

759 search results - page 127 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
85
Voted
ICRE
1998
IEEE
15 years 1 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
82
Voted
CAD
2006
Springer
14 years 9 months ago
Incremental reconstruction of sharp edges on mesh surfaces
Limited by the regular grids in computing, many modelling approaches (e.g., field-based methods) sample 3D shape insensitive to sharp features therefore exhibit aliasing errors, b...
Charlie C. L. Wang
68
Voted
TCOM
2008
110views more  TCOM 2008»
14 years 9 months ago
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
We consider cross-layer adaptive transmission for a single-user system with stochastic data traffic and a timevarying wireless channel. The objective is to vary the transmit power ...
Anh Tuan Hoang, Mehul Motani
83
Voted
IEEEPACT
2009
IEEE
14 years 7 months ago
ITCA: Inter-task Conflict-Aware CPU Accounting for CMPs
Abstract--Chip-MultiProcessor (CMP) architectures are becoming more and more popular as an alternative to the traditional processors that only extract instruction-level parallelism...
Carlos Luque, Miquel Moretó, Francisco J. C...
USS
2010
14 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...