Sciweavers

438 search results - page 32 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
IH
2007
Springer
14 years 1 months ago
A Fusion of Maximum Likelihood and Structural Steganalysis
Abstract. This paper draws together two methodologies for the detection of bit replacement steganography: the principle of maximum likelihood, which is statistically well-founded b...
Andrew D. Ker
ICSEA
2007
IEEE
14 years 1 months ago
The Knowledge Based Software Process Improvement Program: A Rational Analysis
Knowledge management is the key area of focus in the present information technology scenario. It forms a basis to derive standards and models and steers organizations through an e...
K. Alagarsamy, S. Justus, K. Iyakutti
DAC
2005
ACM
14 years 8 months ago
Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions
While performance specifications are verified before sign-off for a modern nanometer scale design, extensive application of optical proximity correction substantially alters the l...
Puneet Gupta, Andrew B. Kahng, Youngmin Kim, Denni...
AUTOMATICA
2008
96views more  AUTOMATICA 2008»
13 years 7 months ago
Nonlinear gliding stability and control for vehicles with hydrodynamic forcing
This paper presents Lyapunov functions for proving stability of steady gliding motions for vehicles with hydrodynamic or aerodynamic forces and moments. Because of lifting forces ...
Pradeep Bhatta, Naomi Ehrich Leonard
RTSS
2002
IEEE
14 years 14 days ago
Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements
In addition to real-time requirements, the program code size is a critical design factor for real-time embedded systems. To take advantage of the code size vs. execution time trad...
Insik Shin, Insup Lee, Sang Lyul Min