Sciweavers

3555 search results - page 658 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICIP
2004
IEEE
16 years 3 months ago
Scalable coding of variable size blocks motion vectors
In this paper we discuss an algorithm that is able to provide a scalable (multiresolution) representation of the motion field information. It has been recently demonstrated that, ...
Davide Maestroni, Augusto Sarti, Marco Tagliasacch...
ICPR
2006
IEEE
16 years 2 months ago
Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling
Magnetic resonance imaging (MRI) allows numerous Fourier domain sampling schemes such as Cartesian and non-Cartesian trajectories (e.g. Polar, circular, and spherical). On the oth...
Hassan Foroosh, Mais Alnasser, Murat Balci
ICSE
2003
IEEE-ACM
16 years 1 months ago
Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined
Pedagogies such as the Personal Software Process (PSP) shift metrics definition, collection, and analysis from the organizational level to the individual level. While case study r...
Philip M. Johnson, Hongbing Kou, Joy Agustin, Chri...
MOBISYS
2007
ACM
16 years 29 days ago
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remo...
Rajesh Krishna Balan, Darren Gergle, Mahadev Satya...
LCN
2008
IEEE
15 years 7 months ago
An analysis on error servers for stochastic network calculus
—Network calculus is a recently developed theory dealing with queuing systems found in computer networks with focus on service guarantee analysis. In the current network calculus...
Jing Xie, Yuming Jiang