Sciweavers

3370 search results - page 579 / 674
» Correlation Embedding Analysis
Sort
View
DRM
2004
Springer
14 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
ESAS
2004
Springer
14 years 3 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
ISOLA
2004
Springer
14 years 3 months ago
Case Studies with Lurette V2
Abstract. Lurette is an automated testing tool dedicated to reactive programs. The test process is automated at two levels: given a formal description of the System Under Test (SUT...
Erwan Jahier, Pascal Raymond, Philippe Baufreton
VMCAI
2004
Springer
14 years 3 months ago
Applying Jlint to Space Exploration Software
Abstract. Java is a very successful programming language which is also becoming widespread in embedded systems, where software correctness is critical. Jlint is a simple but highly...
Cyrille Artho, Klaus Havelund
CHI
2010
ACM
14 years 3 months ago
Touch-display keyboards: transforming keyboards into interactive surfaces
In spite of many advances in GUI workstations, the keyboard has remained limited to text entry and basic command invocation. In this work, we introduce the Touch-Display Keyboard ...
Florian Block, Hans Gellersen, Nicolas Villar