Sciweavers

4647 search results - page 184 / 930
» Analysis and design of OFDM-IDMA systems
Sort
View
ICIP
2005
IEEE
15 years 12 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
IOLTS
2008
IEEE
117views Hardware» more  IOLTS 2008»
15 years 4 months ago
Verification and Analysis of Self-Checking Properties through ATPG
Present and future semiconductor technologies are characterized by increasing parameters variations as well as an increasing susceptibility to external disturbances. Transient err...
Marc Hunger, Sybille Hellebrand
DAC
2007
ACM
15 years 2 months ago
Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application
In this paper, we describe several experiments designed to characterize jitter in an actual automotive application designed using FlexCAN, a CAN based communication architecture. ...
Juan R. Pimentel, Jason Paskvan
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 10 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
ICFEM
1998
Springer
15 years 2 months ago
A Process Algebra Based Verification of a Production System
Studying industrial systems by simulation enables the designer to study the dynamic behaviour and to determine some characteristics of the system. Unfortunately, simulation also h...
J. J. T. Kleijn, J. E. Rooda, Michel A. Reniers