Sciweavers

3516 search results - page 462 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
160
Voted
CIVR
2004
Springer
157views Image Analysis» more  CIVR 2004»
15 years 10 months ago
ICBR - Multimedia Management System for Intelligent Content Based Retrieval
This paper presents a system designed for the management of multimedia databases that embarks upon the problem of efficient media processing and representation for automatic semant...
Janko Calic, Neill W. Campbell, Majid Mirmehdi, Ba...
ISVLSI
2007
IEEE
131views VLSI» more  ISVLSI 2007»
15 years 11 months ago
Improving the Quality of Bounded Model Checking by Means of Coverage Estimation
Formal verification has become an important step in circuit and system design. A prominent technique is Bounded Model Checking (BMC) which is widely used in industry. In BMC it i...
Ulrich Kühne, Daniel Große, Rolf Drechs...
WORM
2003
15 years 6 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...
GLVLSI
2009
IEEE
154views VLSI» more  GLVLSI 2009»
15 years 11 months ago
Design of a maximum-likelihood detector for cooperative communications in intersymbol interference channels
Recently, cooperative communication has attracted a lot of attention for its potential to increase spatial diversity. However, limited attention has been paid to the physical laye...
Yanjie Peng, Andrew G. Klein, Xinming Huang
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
15 years 11 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...