Sciweavers

1629 search results - page 184 / 326
» Infeasible Code Detection
Sort
View
JMM2
2006
218views more  JMM2 2006»
15 years 1 months ago
Automatic Recognition of Facial Actions in Spontaneous Expressions
Spontaneous facial expressions differ from posed expressions in both which muscles are moved, and in the dynamics of the movement. Advances in the field of automatic facial express...
Marian Stewart Bartlett, Gwen Littlewort, Mark G. ...
104
Voted
RTS
2006
84views more  RTS 2006»
15 years 1 months ago
Improving WCET by applying worst-case path optimizations
It is advantageous to perform compiler optimizations that attempt to lower the worst-case execution time (WCET) of an embedded application since tasks with lower WCETs are easier ...
Wankang Zhao, William C. Kreahling, David B. Whall...
114
Voted
TITB
2010
111views Education» more  TITB 2010»
14 years 8 months ago
ECG signal compression and classification algorithm with quad level vector for ECG holter system
An ECG signal processing method with quad level vector (QLV) is proposed for the ECG holter system. The ECG processing consists of the compression flow and the classification flow,...
Hyejung Kim, Refet Firat Yazicioglu, Patrick Merke...
ISESE
2005
IEEE
15 years 7 months ago
System test case prioritization of new and regression test cases
Test case prioritization techniques have been shown to be beneficial for improving regression-testing activities. With prioritization, the rate of fault detection is improved, thu...
Hema Srikanth, Laurie Williams, Jason Osborne
CODES
2007
IEEE
15 years 8 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...