Sciweavers

137 search results - page 15 / 28
» Hybrid Traitor Tracing
Sort
View
TIFS
2008
105views more  TIFS 2008»
13 years 7 months ago
On the Assumption of Equal Contributions in Fingerprinting
With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be ...
Hans Georg Schaathun
JLP
2006
126views more  JLP 2006»
13 years 7 months ago
Compositional modeling and refinement for hierarchical hybrid systems
In this paper, we develop a theory of modular design and refinement of hierarchical hybrid systems. In particular, we present compositional trace-based semantics for the language ...
Rajeev Alur, Radu Grosu, Insup Lee, Oleg Sokolsky
SIGSOFT
2005
ACM
14 years 8 months ago
Performance data collection using a hybrid approach
Performance profiling consists of monitoring a software system during execution and then analyzing the obtained data. There are two ways to collect profiling data: event tracing t...
Edu Metz, Raimondas Lencevicius, Teofilo F. Gonzal...
FUZZIEEE
2007
IEEE
14 years 1 months ago
Decoding Trace Peak Behaviour - A Neuro-Fuzzy Approach
— DNA sequence basecalling is commonly regarded as a solved problem, despite significant error rates being reflected in inaccuracies in databases and genome annotations. This has...
David Thornley, Stavros Petridis
DAC
2001
ACM
14 years 8 months ago
Formal Property Verification by Abstraction Refinement with Formal, Simulation and Hybrid Engines
roperty Verification by Abstraction Refinement with Formal, Simulation and Hybrid Engines Dong Wang , Pei-Hsin Ho , Jiang Long , James Kukula Yunshan Zhu , Tony Ma , Robert D...
Dong Wang, Pei-Hsin Ho, Jiang Long, James H. Kukul...