Sciweavers

887 search results - page 104 / 178
» Automated Detection of Design Patterns
Sort
View
DAC
1999
ACM
16 years 25 days ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 6 months ago
Discovering event evidence amid massive, dynamic datasets
Automated event extraction remains a very difficult challenge requiring information analysts to manually identify key events of interest within massive, dynamic data. Many techniq...
Robert M. Patton, Thomas E. Potok
80
Voted
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
15 years 5 months ago
ubiES: An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies
Expert systems are originally designed to generate feasible alternatives in automated manner. The users expect the systems to contribute to make decisions proactively and intellig...
Ohbyung Kwon, Keedong Yoo, Euiho Suh
VTS
2005
IEEE
89views Hardware» more  VTS 2005»
15 years 5 months ago
Synthesis of Low Power CED Circuits Based on Parity Codes
An automated design procedure is described for synthesizing circuits with low power concurrent error detection. It is based on pre-synthesis selection of a parity-check code follo...
Shalini Ghosh, Sugato Basu, Nur A. Touba
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 11 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang