Sciweavers

2468 search results - page 246 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
ICIAR
2005
Springer
15 years 10 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
LCPC
1999
Springer
15 years 8 months ago
Instruction Scheduling in the Presence of Java's Runtime Exceptions
One of the challenges present to a Java compiler is Java’s frequent use of runtime exceptions. These exceptions affect performance directly by requiring explicit checks, as wel...
Matthew Arnold, Michael S. Hsiao, Ulrich Kremer, B...
DDECS
2006
IEEE
146views Hardware» more  DDECS 2006»
15 years 8 months ago
Automatic Identification of Timing Anomalies for Cycle-Accurate Worst-Case Execution Time Analysis
Abstract-- Hard real-time systems need methods to determine upper bounds for their execution times, usually called worst-case execution times. Timing anomalies are counterintuitive...
Jochen Eisinger, Ilia Polian, Bernd Becker, Alexan...
JUCS
2008
186views more  JUCS 2008»
15 years 4 months ago
Model Interpreter Frameworks: A Foundation for the Analysis of Domain-Specific Software Architectures
: Prediction of the quality attributes of software architectures requires technologies that enable the application of analytic theories to component models. However, available anal...
George Edwards, Chiyoung Seo, Nenad Medvidovic
AAAI
2007
15 years 6 months ago
An Intelligent System for Chinese Calligraphy
Our work links Chinese calligraphy to computer science through an integrated intelligence approach. We first extract strokes of existent calligraphy using a semi-automatic, twoph...
Songhua Xu, Hao Jiang, Francis Chi-Moon Lau, Yunhe...