Sciweavers

1143 search results - page 155 / 229
» Extraction in software watermarking
Sort
View
WMCSA
2002
IEEE
14 years 3 months ago
The Location Stack: A Layered Model for Location in Ubiquitous Computing
Based on five design principles extracted from a survey of location systems, we present the Location Stack, a layered software engineering model for location in ubiquitous comput...
Jeffrey Hightower, Barry Brumitt, Gaetano Borriell...
COMPSAC
2009
IEEE
14 years 2 months ago
Transaction Level Control for Application Execution on the SegBus Platform
Abstract—We define here a simple, low level control procedure definition, to support application implementation on a particular multiprocessor platform, namely the SegBus segme...
Tiberiu Seceleanu, Ivica Crnkovic, Cristina Cersch...
WETICE
1999
IEEE
14 years 2 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
EURODAC
1994
IEEE
94views VHDL» more  EURODAC 1994»
14 years 2 months ago
A Study of Undetectable Non-Feedback Shorts for the Purpose of Physical-DFT
Undetectable shorts may decrease the long term reliability of a circuit, cause intermittent failures, add noise and delay, or increase test pattern generation costs. This paper de...
Richard McGowen, F. Joel Ferguson
AVBPA
2003
Springer
141views Biometrics» more  AVBPA 2003»
14 years 1 months ago
On the Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
Abstract. The accuracy of Automatic Fingerprint Identification Systems (AFIS) is dependent on many variables ranging from the quality of the friction skin surface itself, to the ab...
J. K. Schneider, C. E. Richardson, F. W. Kiefer, V...