Sciweavers

4887 search results - page 707 / 978
» System Level Design Using C
Sort
View
ICPR
2008
IEEE
16 years 5 months ago
Recognition of books by verification and retraining
The problem of character recognition in a book should be formulated significantly different from that of a single page or word. An ideal approach to design such a recognizer is to...
C. V. Jawahar, N. V. Neeba
DAC
2007
ACM
16 years 5 months ago
Reliability Analysis for Flexible Electronics: Case Study of Integrated a-Si: H TFT Scan Driver
Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires pr...
Tsung-Ching Huang, Huai-Yuan Tseng, Chen-Pang Kung...
WWW
2003
ACM
16 years 4 months ago
A Web Service Market Model based on Dependencies
The construction of composite Web Services from service fragments requires semantic descriptions of service offers and service requests. We propose the use of dependencies as a mo...
Robert Tolksdorf, Christian Bizer, Ralf Heese
126
Voted
ASM
2010
ASM
16 years 1 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
ETFA
2005
IEEE
15 years 9 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver