Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
This paper presents a design and an implementation of document image retrieval to support reading mokkans. A mokkan is a wooden tablet with text written by a brush in India ink. D...
Akihito Kitadai, Jun Takakura, Masatoshi Ishikawa,...
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Model transformations support a model-driven design by providing an c translation of abstract models into more concrete ones, and eventually program code. Crucial to a successful a...
Gregor Engels, Anneke Kleppe, Arend Rensink, Maria...