Sciweavers

5962 search results - page 117 / 1193
» Working with Patterns and Code
Sort
View
ISECS
2008
IEEE
15 years 9 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
ICSE
2001
IEEE-ACM
15 years 7 months ago
Architecture-Oriented Programming Using FRED
Implementing application-specific code conforming to architectural rules and conventions can be tedious. FRED is a tool prototype for architecture-oriented programming that takes ...
Markku Hakala, Juha Hautamäki, Kai Koskimies,...
131
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Codebook: Social networking over code
Social networking systems help people maintain connections to their friends, enabling awareness, communication, and collaboration, especially at a distance. In many studies of coo...
Andrew Begel, Robert DeLine
130
Voted
ICIP
2005
IEEE
16 years 5 months ago
H.264/MPEG4-AVC fidelity range extensions: tools, profiles, performance, and application areas
The technical work on the first amendment of the H.264/MPEG4-AVC video coding standard has recently been completed. In these so-called Fidelity Range Extensions (FRExt) a set of ne...
Detlev Marpe, Thomas Wiegand, Stephen Gordon
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 9 months ago
Dictionary-based program compression on transport triggered architectures
— Program code size has become a critical design constraint of embedded systems. Large program codes require large memories, which increase the size and cost of the chip. Poor co...
Jari Heikkinen, Andrea G. M. Cilio, Jarmo Takala, ...