Sciweavers

328 search results - page 55 / 66
» Algorithms for the edge-width of an embedded graph
Sort
View
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
15 years 1 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
FDL
2004
IEEE
15 years 1 months ago
On Actors and Objects - OOP in System Level Design
The steadily increasing complexity of embedded systems requires comprehensive methodoloat support the design process from the highest possible abstraction level. In most of the cu...
Joachim K. Anlauf, Philipp A. Hartmann
ACSAC
2008
IEEE
15 years 4 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
IPSN
2010
Springer
15 years 4 months ago
On-line sensing task optimization for shared sensors
Shared sensing infrastructures that allow multiple applications to share deployed sensors are emerging and Internet protocol based access for such sensors has already been prototy...
Arsalan Tavakoli, Aman Kansal, Suman Nath
DASFAA
2007
IEEE
199views Database» more  DASFAA 2007»
15 years 3 months ago
Detection and Visualization of Subspace Cluster Hierarchies
Subspace clustering (also called projected clustering) addresses the problem that different sets of attributes may be relevant for different clusters in high dimensional feature sp...
Elke Achtert, Christian Böhm, Hans-Peter Krie...