Sciweavers

2468 search results - page 339 / 494
» Aggregation operators 2003
Sort
View
ICCAD
2003
IEEE
115views Hardware» more  ICCAD 2003»
14 years 6 months ago
Efficient Verification of Hazard-Freedom in Gate-Level Timed Asynchronous Circuits
This paper presents an efficient method for verifying hazard freedom in timed asynchronous circuits. Timed circuits are a class of asynchronous circuits that utilize explicit tim...
Curtis A. Nelson, Chris J. Myers, Tomohiro Yoneda
ICST
2009
IEEE
14 years 3 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
CSFW
2006
IEEE
14 years 3 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ICMCS
2005
IEEE
177views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Comparison of Visual Features and Fusion Techniques in Automatic Detection of Concepts from News Video
This study describes experiments on automatic detection of semantic concepts, which are textual descriptions about the digital video content. The concepts can be further used in c...
Mika Rautiainen, Tapio Seppänen
ACSAC
2003
IEEE
14 years 2 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...