Sciweavers

3238 search results - page 387 / 648
» Not Enough Points Is Enough
Sort
View
AINA
2007
IEEE
15 years 5 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 5 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
116
Voted
ASPDAC
2007
ACM
109views Hardware» more  ASPDAC 2007»
15 years 5 months ago
On Increasing Signal Integrity with Minimal Decap Insertion in Area-Array SoC Floorplan Design
Abstract-- With technology further scaling into deep submicron era, power supply noise become an important problem. Power supply noise problem is getting worse due to serious IR-dr...
Chao-Hung Lu, Hung-Ming Chen, Chien-Nan Jimmy Liu
152
Voted
CASES
2007
ACM
15 years 5 months ago
Compiler generation from structural architecture descriptions
With increasing complexity of modern embedded systems, the availability of highly optimizing compilers becomes more and more important. At the same time, application specific inst...
Florian Brandner, Dietmar Ebner, Andreas Krall
95
Voted
CDC
2009
IEEE
130views Control Systems» more  CDC 2009»
15 years 5 months ago
Mixed linear system estimation and identification
We consider a mixed linear system model, with both continuous and discrete inputs and outputs, described by a coefficient matrix and a set of noise variances. When the discrete inp...
Argyrios Zymnis, Stephen P. Boyd, Dimitry M. Gorin...