Sciweavers

817 search results - page 63 / 164
» Malware behaviour analysis
Sort
View
IPPS
1998
IEEE
15 years 4 months ago
Performance Analysis of Parallel Embedded Real Time Systems Based on Measurement and Visualization
This paper describes an approach to carry out performance analysis on systems which combine two major characteristics: real-time behaviour and parallel computational structure. It ...
Javier García, Jose Luis Díaz de Arr...
ICIP
2005
IEEE
16 years 1 months ago
Analysis of distortion due to packet loss in streaming video transmission over wireless communication links
In this paper, we provide an accurate and fully analytical model for the distortion due to lost frames in wireless video transmission. Our analysis combines the properties of the ...
Ruly Lai-U Choi, Michel T. Ivrlac, Eckehard G. Ste...
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
16 years 7 days ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
SAC
2006
ACM
15 years 5 months ago
A probability analysis for candidate-based frequent itemset algorithms
This paper explores the generation of candidates, which is an important step in frequent itemset mining algorithms, from a theoretical point of view. Important notions in our prob...
Nele Dexters, Paul W. Purdom, Dirk Van Gucht
ATAL
2005
Springer
15 years 5 months ago
Experimental analysis of negotiation meta strategies
In this paper we present a meta strategy that combines two negotiation tactics. The first one based on concessions, and the second one, a trade-off tactic. The goal of this work...
Raquel Ros, Carles Sierra