Sciweavers

1164 search results - page 158 / 233
» Constructive nonlinear dynamics in process systems engineeri...
Sort
View
ACSC
2006
IEEE
15 years 6 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
131
Voted
PAMI
2008
195views more  PAMI 2008»
15 years 16 days ago
Robust Radiometric Calibration and Vignetting Correction
In many computer vision systems, it is assumed that the image brightness of a point directly reflects the scene radiance of the point. However, the assumption does not hold in mos...
Seon Joo Kim, Marc Pollefeys
148
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 4 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ICSE
1999
IEEE-ACM
15 years 4 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
ICCAD
1995
IEEE
129views Hardware» more  ICCAD 1995»
15 years 4 months ago
Activity-driven clock design for low power circuits
In this paper we investigate activity-driven clock trees to reduce the dynamic power consumption of synchronous digital CMOS circuits. Sections of an activity-driven clock tree ca...
Gustavo E. Téllez, Amir H. Farrahi, Majid S...