Sciweavers

2421 search results - page 53 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
100
Voted
ICIP
2002
IEEE
16 years 2 months ago
A blind watermarking technique in JPEG compressed domain
We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coefficients are extracted to form an M-dimensional vector. Watermar...
Oscar C. Au, Peter H. W. Wong
128
Voted
ASPDAC
2010
ACM
135views Hardware» more  ASPDAC 2010»
14 years 10 months ago
Efficient power grid integrity analysis using on-the-fly error check and reduction
In this paper, we present a new voltage IR drop analysis approach for large on-chip power delivery networks. The new approach is based on recently proposed sampling based reductio...
Duo Li, Sheldon X.-D. Tan, Ning Mi, Yici Cai
102
Voted
CHARME
2005
Springer
136views Hardware» more  CHARME 2005»
15 years 6 months ago
Predictive Reachability Using a Sample-Based Approach
Abstract. Unbounded model checking of invariant properties is typically solved using symbolic reachability. However, BDD based reachability methods suffer from lack of robustness ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...
83
Voted
IWIA
2003
IEEE
15 years 5 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
118
Voted
IFIP3
1998
151views Education» more  IFIP3 1998»
15 years 1 months ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...