Sciweavers

5550 search results - page 1048 / 1110
» Different Approaches to Proof Systems
Sort
View
ICCSA
2007
Springer
15 years 4 months ago
3D Spatial Operations in Geo DBMS Environment for 3D GIS
Next generation of GIS software should be able to manipulate and analyse complex situations of real world phenomena. One of the desired components in such software or system is the...
Chen Tet-Khuan, Alias Abdul-Rahman, Sisi Zlatanova
102
Voted
ISQED
2006
IEEE
107views Hardware» more  ISQED 2006»
15 years 4 months ago
On Optimizing Scan Testing Power and Routing Cost in Scan Chain Design
— With advanced VLSI manufacturing technology in deep submicron (DSM) regime, we can integrate entire electronic systems on a single chip (SoC). Due to the complexity in SoC desi...
Li-Chung Hsu, Hung-Ming Chen
73
Voted
EGOV
2004
Springer
15 years 3 months ago
Software Acquisition Based on Business Models
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
Peter Regner, Thomas Wiesinger, Josef Küng, R...
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 3 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
DISCEX
2003
IEEE
15 years 3 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
« Prev « First page 1048 / 1110 Last » Next »