Sciweavers

1516 search results - page 191 / 304
» The Increasing Nvalue Constraint
Sort
View
142
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
Applying a Tradeoff Model (TOM) to TACT
In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the techniq...
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
IEEEPACT
2007
IEEE
15 years 10 months ago
Automatic Correction of Loop Transformations
Loop nest optimization is a combinatorial problem. Due to the growing complexity of modern architectures, it involves two increasingly difficult tasks: (1) analyzing the profita...
Nicolas Vasilache, Albert Cohen, Louis-Noël P...
IPPS
2007
IEEE
15 years 10 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
IPPS
2007
IEEE
15 years 10 months ago
Using Speed Diagrams for Symbolic Quality Management
We present a quality management method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions are unkno...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...
MEMOCODE
2007
IEEE
15 years 10 months ago
Combining Multi-Valued Logics in SAT-based ATPG for Path Delay Faults
Due to the rapidly growing speed and the decreasing size of gates in modern chips, the probability of faults caused by the production process grows. Already small variations lead ...
Stephan Eggersglüß, Görschwin Fey,...