Sciweavers

1143 search results - page 126 / 229
» Extraction in software watermarking
Sort
View
ASWEC
2005
IEEE
14 years 2 months ago
A Formal Method for Program Slicing
Program slicing is a well-known program analysis technique that extracts the elements of a program related to a particular computation. Based on modular monadic semantics of a pro...
Yingzhou Zhang, Baowen Xu, José Emilio Labr...
FDL
2005
IEEE
14 years 2 months ago
System model of an inertial navigation system using SystemC-AMS
This paper presents an approach for modeling an inertial navigation system. This system consists of a 3D acceleration and rotation sensor array, analog and digital error correctio...
Erik Markert, Göran Herrmann, Dietmar Mü...
IUI
2005
ACM
14 years 2 months ago
Doubleshot: an interactive user-aided segmentation tool
In this paper, we describe an intelligent user interface designed for camera phones to allow mobile users to specify the object of interest in the scene simply by taking two pictu...
Tom Yeh, Trevor Darrell
IUI
2005
ACM
14 years 2 months ago
Generating semantic contexts from spoken conversation in meetings
SemanticTalk is a tool for supporting face-to-face meetings and discussions by automatically generating a semantic context from spoken conversations. We use speech recognition and...
Jürgen Ziegler, Zoulfa El Jerroudi, Karsten B...
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi