Sciweavers

3373 search results - page 347 / 675
» Linear transformations on codes
Sort
View
RTSS
2005
IEEE
15 years 9 months ago
Quantifying the Gap between Embedded Control Models and Time-Triggered Implementations
Mapping a set of feedback control components to executable code introduces errors due to a variety of factors such as discretization, computational delays, and scheduling policies...
Hakan Yazarel, Antoine Girard, George J. Pappas, R...
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 4 months ago
An approach to RAID-6 based on cyclic groups of a prime order
As the size of data storing arrays of disks grows, it becomes vital to protect data against double disk failures. An economic way of providing such protection consists of adding tw...
R. Jackson, D. Rumynin, O. Zaboronski
WWW
2001
ACM
16 years 4 months ago
XML and XSLT Modeling for Multimedia Bitstream Manipulation
New devices gaining access to the Internet need to obtain multimedia content adapted to their limited capacities. Scalable formats allow to retrieve different versions of a single...
Sylvain Devillers
IWPC
2007
IEEE
15 years 10 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
ICPADS
2006
IEEE
15 years 10 months ago
iDIBS: An Improved Distributed Backup System
iDIBS is a peer-to-peer backup system which optimizes the Distributed Internet Backup System (DIBS). iDIBS offers increased reliability by enhancing the robustness of existing pac...
Faruck Morcos, Thidapat Chantem, Philip Little, Ti...