Sciweavers

1222 search results - page 181 / 245
» Verifying a File System Implementation
Sort
View
117
Voted
PAMI
2007
150views more  PAMI 2007»
15 years 1 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
15 years 7 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
110
Voted
MICRO
1999
IEEE
105views Hardware» more  MICRO 1999»
15 years 6 months ago
DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design
Building a high-performance microprocessor presents many reliability challenges. Designers must verify the correctness of large complex systems and construct implementations that ...
Todd M. Austin
DSD
2007
IEEE
164views Hardware» more  DSD 2007»
15 years 8 months ago
An Efficient Hardware Architecture for Quarter-Pixel Accurate H.264 Motion Estimation
In this paper, we present an efficient hardware architecture for real-time implementation of quarter-pixel accurate variable block size motion estimation for H.264 / MPEG4 Part 10...
Serkan Oktem, Ilker Hamzaoglu
AOSD
2005
ACM
15 years 8 months ago
Modularizing design patterns with aspects: a quantitative study
Design patterns offer flexible solutions to common problems in software development. Recent studies have shown that several design patterns involve crosscutting concerns. Unfortun...
Alessandro F. Garcia, Cláudio Sant'Anna, Ed...