Sciweavers

416 search results - page 26 / 84
» Some new approaches for preventing software tampering
Sort
View
CSFW
2007
IEEE
15 years 5 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
TASLP
2010
124views more  TASLP 2010»
14 years 6 months ago
Audio Signal Representations for Indexing in the Transform Domain
Indexing audio signals directly in the transform domain can potentially save a significant amount of computation when working on a large database of signals stored in a lossy compr...
Emmanuel Ravelli, Gaël Richard, Laurent Daude...
VLSID
2003
IEEE
147views VLSI» more  VLSID 2003»
15 years 12 months ago
SoC Synthesis with Automatic Hardware Software Interface Generation
Design of efficient System-on-Chips (SoCs) require thorough application analysis to identify various compute intensive parts. These compute intensive parts can be mapped to hardwa...
Amarjeet Singh 0002, Amit Chhabra, Anup Gangwar, B...
CSMR
2007
IEEE
15 years 5 months ago
Online Construction of Dynamic Object Process Graphs
A dynamic object process graph is a view on the control flow graph from the perspective of a single object. It has been shown that such a graph can be a useful starting point for...
Jochen Quante
ICPR
2008
IEEE
15 years 6 months ago
Non-rigid image registration based on the globally optimized correspondences
In this paper, we propose a new approach to the non-rigid image registration. This problem can be easily attacked if we can find regularly distributed correspondence points over ...
Hyung il Koo, Jung Gap Kuk, Nam Ik Cho