Sciweavers

935 search results - page 155 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
AOSD
2010
ACM
15 years 8 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
CVPR
2004
IEEE
16 years 3 months ago
Programmable Imaging Using a Digital Micromirror Array
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric a...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult
CAV
1998
Springer
175views Hardware» more  CAV 1998»
15 years 5 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
EH
2003
IEEE
136views Hardware» more  EH 2003»
15 years 6 months ago
Experimental Results in Evolutionary Fault-Recovery for Field Programmable
This paper presents experimental results of fast intrinsic evolutionary design and evolutionary fault recovery of a 4-bit Digital to Analog Converter (DAC) using the JPL stand-alo...
Ricardo Salem Zebulum, Didier Keymeulen, Vu Duong,...
ICASSP
2008
IEEE
15 years 7 months ago
Mixed-signal parallel compressed sensing and reception for cognitive radio
A parallel structure to do spectrum sensing in Cognitive Radio (CR) at sub-Nyquist rate is proposed. The structure is based on Compressed Sensing (CS) that exploits the sparsity o...
Zhuizhuan Yu, Sebastian Hoyos, Brian M. Sadler