Sciweavers

2523 search results - page 418 / 505
» Correct Development of Embedded Systems
Sort
View
TIFS
2008
142views more  TIFS 2008»
13 years 9 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
TSE
2008
99views more  TSE 2008»
13 years 9 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
IJMI
2002
82views more  IJMI 2002»
13 years 8 months ago
Protein names and how to find them
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...
Kristofer Franzén, Gunnar Eriksson, Fredrik...
SIAMSC
2010
129views more  SIAMSC 2010»
13 years 7 months ago
A Micro-Macro Decomposition-Based Asymptotic-Preserving Scheme for the Multispecies Boltzmann Equation
In this paper we extend the micro-macro decomposition based asymptotic-preserving scheme developed in [3] for the single species Boltzmann equation to the multispecies problems. A...
Shi Jin, Yingzhe Shi
ICIP
2010
IEEE
13 years 7 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...