Sciweavers

2523 search results - page 411 / 505
» Correct Development of Embedded Systems
Sort
View
109
Voted
DAC
2000
ACM
16 years 3 months ago
Designing systems-on-chip using cores
Leading-edge systems-on-chip (SoC) being designed today could reach 20 Million gates and 0.5 to 1 GHz operating frequency. In order to implement such systems, designers are increa...
Reinaldo A. Bergamaschi, William R. Lee
ICML
2004
IEEE
16 years 3 months ago
Relational sequential inference with reliable observations
We present a trainable sequential-inference technique for processes with large state and observation spaces and relational structure. Our method assumes "reliable observation...
Alan Fern, Robert Givan
101
Voted
ACCV
2009
Springer
15 years 9 months ago
Weighted Map for Reflectance and Shading Separation Using a Single Image
In real world, a scene is composed by many characteristics. Intrinsic images represent these characteristics by two components, reflectance (the albedo of each point) and shading (...
Sung-Hsien Hsieh, Chih-Wei Fang, Te-Hsun Wang, Chi...
106
Voted
IWSEC
2009
Springer
15 years 9 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
RAID
2009
Springer
15 years 9 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...