Sciweavers

2826 search results - page 137 / 566
» A resource-based analysis of IT sourcing
Sort
View
DRM
2005
Springer
15 years 7 months ago
Improved watermark detection for spread-spectrum based watermarking using independent component analysis
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the ...
Hafiz Malik, Ashfaq A. Khokhar, Rashid Ansari
CCECE
2009
IEEE
15 years 6 months ago
Capacity analysis of a decode-and-forward cooperative network under adaptive transmission
—This paper presents a capacity analysis of a decode-and-forward (DF) cooperative network with adaptive source transmission. Three different adaptive techniques are considered: (...
Prasanna Kalansuriya, Chintha Tellambura
109
Voted
ISQED
2000
IEEE
117views Hardware» more  ISQED 2000»
15 years 6 months ago
Realistic Worst-Case Modeling by Performance Level Principal Component Analysis
A new algorithm to determine the number and value of realistic worst-case models for the performance of module library components is presented in this paper. The proposed algorith...
Alessandra Nardi, Andrea Neviani, Carlo Guardiani
140
Voted
WETICE
1999
IEEE
15 years 6 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
113
Voted
ISLPED
1998
ACM
69views Hardware» more  ISLPED 1998»
15 years 6 months ago
A unified approach in the analysis of latches and flip-flops for low-power systems
In this paper we propose a set of rules for consistent estimation of the real performance and power features of the latch and flip-flop structures. A new simulation and optimizati...
Vladimir Stojanovic, Vojin G. Oklobdzija, Raminder...