Sciweavers

146 search results - page 27 / 30
» A Systematic Method to Identify Software Components
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Image Tampering Identification using Blind Deconvolution
Digital images have been used in growing number of applications from law enforcement and surveillance, to medical diagnosis and consumer photography. With such widespread populari...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
ESORICS
2010
Springer
13 years 9 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
BMCBI
2006
100views more  BMCBI 2006»
13 years 8 months ago
Empirical array quality weights in the analysis of microarray data
Background: Assessment of array quality is an essential step in the analysis of data from microarray experiments. Once detected, less reliable arrays are typically excluded or &qu...
Matthew E. Ritchie, Dileepa S. Diyagama, Jody Neil...
NOCS
2007
IEEE
14 years 2 months ago
On Characterizing Performance of the Cell Broadband Engine Element Interconnect Bus
Abstract – With the rise of multicore computing, the design of onchip networks (or networks on chip) has become an increasingly important component of computer architecture. The ...
Thomas William Ainsworth, Timothy Mark Pinkston
ASE
2002
160views more  ASE 2002»
13 years 7 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...