Sciweavers

407 search results - page 55 / 82
» An Automated Verification Method for Distributed Systems Sof...
Sort
View
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
DAC
2006
ACM
14 years 9 months ago
Prototyping a fault-tolerant multiprocessor SoC with run-time fault recovery
Modern integrated circuits (ICs) are becoming increasingly complex. The complexity makes it difficult to design, manufacture and integrate these high-performance ICs. The advent o...
Xinping Zhu, Wei Qin
WWW
2003
ACM
14 years 9 months ago
Bridging the P2P and WWW Divide with DISCOVIR - DIStributed COntent-based Visual Information Retrieval
In the light of image retrieval evolving from text annotation to content-based and from standalone applications to web-based search engines, we foresee the need for deploying cont...
Ka Cheung Sia, Cheuk Hang Ng, Chi-Hang Chan
TASE
2008
IEEE
13 years 8 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu
TCSV
2008
277views more  TCSV 2008»
13 years 8 months ago
Automatic Single View-Based 3-D Face Synthesis for Unsupervised Multimedia Applications
Abstract--Various 3-D face synthesis techniques have been proposed and extensively used in many applications. Compared with others, single view-based face synthesis technology allo...
Yun Sheng, Abdul H. Sadka, Ahmet M. Kondoz