Sciweavers

3130 search results - page 114 / 626
» Design Correctness of Digital Systems
Sort
View
USS
2008
15 years 6 months ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
156
Voted
ICADL
2003
Springer
140views Education» more  ICADL 2003»
15 years 8 months ago
LVS Digital Library Cluster with Fair Memory Utilization
A digital library system consists of LVS(Linux Virtual Server) operating with software clustering technology provides is designed on Linux environment. In the cluster of servers fa...
MinHwan Ok, Kyeongmo Kang, Myong-Soon Park
125
Voted
SAS
2000
Springer
15 years 7 months ago
Enforcing Design Constraints with Object Logic
Design constraints express essential behavioural properties of a software system. Two key elements of a scheme for enforcing design constraints are presented: a logic for describin...
Daniel Jackson
85
Voted
ISCAS
2003
IEEE
75views Hardware» more  ISCAS 2003»
15 years 9 months ago
VLSI implementation of a real-time video watermark embedder and detector
This paper describes the hardware design and implementation of the JAWS (Just Another Watermarking System) embedder and detector for watermarking of realtime uncompressed digital ...
Nebu John Muthui, Ali Sheikholeslami, Deepa Kundur
120
Voted
RTSS
2007
IEEE
15 years 10 months ago
The Design of an EDF-Scheduled Resource-Sharing Open Environment
We study the problem of executing a collection of independently designed and validated task systems upon a common comprised of a preemptive processor and additional shared resourc...
Nathan Fisher, Marko Bertogna, Sanjoy K. Baruah