Sciweavers

7429 search results - page 94 / 1486
» Embedded System Update
Sort
View
CHI
2007
ACM
15 years 10 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
IVC
2006
171views more  IVC 2006»
14 years 10 months ago
Motion detection and tracking using belief indicators for an automatic visual-surveillance system
A motion detection and tracking algorithm for human and car activity surveillance is presented and evaluated by using the Pets'2000 test sequence. Proposed approach uses a te...
Cina Motamed
TII
2010
146views Education» more  TII 2010»
14 years 4 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
ICMCS
1999
IEEE
127views Multimedia» more  ICMCS 1999»
15 years 2 months ago
Achievable Performance of Digital Watermarking Systems
A variety of digital watermarking applications have emerged recently that require the design of systems for embedding one signal (the "embedded signal" or "watermar...
Brian Chen, Gregory W. Wornell
ISORC
2008
IEEE
15 years 4 months ago
The Complexity Challenge in Embedded System Design
The specific constraints that must be satisfied by embedded systems, such as timeliness, energy efficiency of battery-operated devices, dependable operation in safety-relevant sce...
Hermann Kopetz