Sciweavers

675 search results - page 125 / 135
» A Multi-objective Approach to Configuring Embedded System Ar...
Sort
View
DAC
1998
ACM
14 years 8 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
DAC
2002
ACM
14 years 8 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...
TABLETOP
2008
IEEE
14 years 1 months ago
Experiences with building a thin form-factor touch and tangible tabletop
In this paper we describe extensions to our work on ThinSight, necessary to scale the system to larger tabletop displays. The technique integrates optical sensors into existing of...
Shahram Izadi, Alex Butler, Steve Hodges, Darren W...
RTAS
2007
IEEE
14 years 1 months ago
Soft Real-Time Scheduling on Performance Asymmetric Multicore Platforms
This paper discusses an approach for supporting soft realtime periodic tasks in Linux on performance asymmetric multicore platforms (AMPs). Such architectures consist of a large n...
John M. Calandrino, Dan P. Baumberger, Tong Li, Sc...
CIMCA
2006
IEEE
14 years 1 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet