Sciweavers

111 search results - page 3 / 23
» Effective Iterative Techniques for Fingerprinting Design IP
Sort
View
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 4 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
DAC
2005
ACM
14 years 7 months ago
MP core: algorithm and design techniques for efficient channel estimation in wireless applications
Channel estimation and multiuser detection are enabling technologies for future generations of wireless applications. However, sophisticated algorithms are required for accurate c...
Yan Meng, Andrew P. Brown, Ronald A. Iltis, Timoth...
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
13 years 10 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
TON
2002
138views more  TON 2002»
13 years 5 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
13 years 4 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar