Sciweavers

3555 search results - page 137 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 8 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
CIVR
2007
Springer
138views Image Analysis» more  CIVR 2007»
15 years 7 months ago
SemRetriev: an ontology driven image retrieval system
This paper describes the technical details of SemRetriev, a prototype system for image retrieval which combines the use of an ontology which structures an image repository and of ...
Adrian Popescu, Pierre-Alain Moëllic, Christo...
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
15 years 7 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
RTSS
2007
IEEE
15 years 7 months ago
ANDES: An ANalysis-Based DEsign Tool for Wireless Sensor Networks
— We have developed an analysis-based design tool, ANDES, for modeling a wireless sensor network system and analyzing its performance before deployment. ANDES enables designers t...
Vibha Prasad, Ting Yan, Praveen Jayachandran, Zeng...
KDD
2007
ACM
335views Data Mining» more  KDD 2007»
16 years 2 months ago
Detecting changes in large data sets of payment card data: a case study
An important problem in data mining is detecting changes in large data sets. Although there are a variety of change detection algorithms that have been developed, in practice it c...
Chris Curry, Robert L. Grossman, David Locke, Stev...