Sciweavers

22864 search results - page 17 / 4573
» An Integrated and
Sort
View
DAC
2000
ACM
15 years 10 months ago
Closing the gap between ASIC and custom: an ASIC perspective
We investigate the differences in speed between applicationspecific integrated circuits and custom integrated circuits when each are implemented in the same process technology, wi...
David G. Chinnery, Kurt Keutzer
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 3 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
59
Voted
APSEC
2002
IEEE
15 years 2 months ago
Tool Interfacing Mechanisms for Programming-for-the-Large and Programming-for-the-Small
Software development needs to be supported at both the organisational process level (programming-for-thelarge) and the detailed coding level (programming-for-thesmall). It is crit...
Yun Yang
ALPIT
2007
IEEE
15 years 3 months ago
Model Driven and Service Oriented Enterprise Integration---The Method, Framework and Platform
SOA and MDA have emerged as a major evolutionary step in enterprise integration. Significant advances have been seen in SOA and MDA. But the integration of SOA and MDA is still la...
Shuangxi Huang, Yushun Fan