Sciweavers

3555 search results - page 226 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SJIS
2002
74views more  SJIS 2002»
15 years 4 months ago
Co-Realisation
This paper calls for a re-specification of IT systems design and development practice as corealisation. Co-realisation is an orientation to technology production that develops out...
Mark Hartswood, Rob Procter, Roger Slack, Alex Vos...
JUCS
2008
144views more  JUCS 2008»
15 years 5 months ago
Embedded Software Revitalization through Component Mining and Software Product Line Techniques
: The mining of generic software components from legacy systems can be used as an auxiliary technique to revitalize systems. This paper presents a software maintenance approach tha...
Marcelo A. Ramos, Rosângela Dellosso Pentead...
ICMCS
2010
IEEE
181views Multimedia» more  ICMCS 2010»
15 years 3 months ago
LDPC FEC code extension for unequal error protection in 2nd generation DVB systems
One of the envisioned advantages of scalable video coding is its inherent suitability for achieving unequal error protection (UEP). UEP can be effectively used for graceful qualit...
Lukasz Kondrad, Imed Bouazizi, Moncef Gabbouj
142
Voted
TSP
2010
14 years 11 months ago
SNR estimation for multilevel constellations using higher-order moments
Abstract--The performance of existing moments-based nondata-aided (NDA) estimators of signal-to-noise ratio (SNR) in digital communication systems substantially degrades with multi...
Marcos Álvarez-Díaz, Roberto L&oacut...
ENTCS
2006
231views more  ENTCS 2006»
15 years 5 months ago
SaveCCM: An Analysable Component Model for Real-Time Systems
Component based development is a promising approach for embedded systems. Typical for embedded software is the presence of resource constraints in multiple dimensions. An essentia...
Jan Carlson, John Håkansson, Paul Pettersson