Sciweavers

188 search results - page 16 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 5 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 3 months ago
Evaluating the Quality of Models Extracted from Embedded Real-Time Software
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy sys...
Joel Huselius, Johan Kraft, Hans Hansson, Sasikuma...
ETS
2000
IEEE
154views Hardware» more  ETS 2000»
14 years 11 months ago
The Knowledge Depot: Building and Evaluating a Knowledge Management System
Organizations have long had the need to record and protect the knowledge that is their intellectual capital. However, the primary burden for knowledge management has been borne by...
Beatrix Zimmermann, Michael E. Atwood, Sabina Webb...
ICSOC
2003
Springer
15 years 5 months ago
Semantic Structure Matching for Assessing Web-Service Similarity
The web-services stack of standards is designed to support the reuse and interoperation of software components on the web. A critical step in the process of developing applications...
Yiqiao Wang, Eleni Stroulia
DATE
1997
IEEE
107views Hardware» more  DATE 1997»
15 years 4 months ago
Acceleration of behavioral simulation on simulation specific machines
Behavioral simulation is faster than gate-level logic simulation, however, the simulation speed is too slow for large systems. Simulation specific machines accelerated simulation ...
Minoru Shoji, Fumiyasu Hirose, Shintaro Shimogori,...