Sciweavers

1620 search results - page 122 / 324
» Use Case Level Pointcuts
Sort
View
CASES
2005
ACM
15 years 5 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
134
Voted
FLAIRS
1998
15 years 4 months ago
The Program Analysis Tool for Reuse: Identifying Reusable Components
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software quality. The research that has addressed this problem has concentrated on code cr...
Letha H. Etzkorn, Carl G. Davis, Lisa L. Bowen, Ja...
147
Voted
CCS
2010
ACM
15 years 3 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
ICCV
1998
IEEE
16 years 5 months ago
Optical Flow Estimation Using Wavelet Motion Model
A motion estimation algorithm using wavelet approximation as an optical ow model has been developed to estimate accurate dense optical ow from an image sequence. This wavelet moti...
Yu-Te Wu, Takeo Kanade, Jeffrey F. Cohn, Ching-Chu...
EURODAC
1994
IEEE
209views VHDL» more  EURODAC 1994»
15 years 7 months ago
MOS VLSI circuit simulation by hardware accelerator using semi-natural models
- The accelerator is destined to circuit-level simulation of digital and analog/digital MOS VLSI'c containing of up to 100 thousand transistors (with 16 Mb RAM host-machine). ...
Victor V. Denisenko