Sciweavers

3555 search results - page 220 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
RTCSA
1999
IEEE
15 years 8 months ago
Pipeline Timing Analysis Using a Trace-Driven Simulator
In this paper we present a technique for Worst-Case Execution Time WCET analysis for pipelined processors. Our technique uses a standard simulator instead of special-purpose pipel...
Jakob Engblom, Andreas Ermedahl
PVLDB
2010
163views more  PVLDB 2010»
15 years 2 months ago
Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight
Microsoft SQL Server spatial libraries contain several components that handle geometrical and geographical data types. With advances in geo-sensing technologies, there has been an...
Seyed Jalal Kazemitabar, Ugur Demiryurek, Mohamed ...
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
15 years 8 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
WSCG
2004
185views more  WSCG 2004»
15 years 5 months ago
Automatic Fitting and Control of Complex Freeform Shapes in 3-D
In many computer graphics and computer-aided design problems, it is very common to find a smooth and well structured surface to fit a set of unstructured 3-dimensional data. Altho...
Yu Song, Joris S. M. Vergeest, Chensheng Wang
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
15 years 9 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari