Sciweavers

925 search results - page 124 / 185
» Implementing Function Block Adapters
Sort
View
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 4 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
ITCC
2005
IEEE
14 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
KR
2004
Springer
14 years 3 months ago
Discovering State Invariants
We continue to advocate a methodology that we used earlier for pattern discovery through exhaustive search in selected small domains. This time we apply it to the problem of disco...
Fangzhen Lin
RSP
2003
IEEE
149views Control Systems» more  RSP 2003»
14 years 3 months ago
Rapid Scheduling of Efficient VLSI Architectures for Next-Generation HSDPA
In this paper, an efficient design flow integrating Mentor Graphics Precesion C and HDL designer is derived. In this hybrid prototyping environment, efficient FPGA architectures a...
Yuanbin Guo, Gang Xu, Dennis McCain, Joseph R. Cav...
SIBGRAPI
2003
IEEE
14 years 3 months ago
Helical CT Reconstruction from Wide Cone-Beam Angle Data Using ART
We report on new results on the use of Algebraic Reconstruction Techniques (ART) for reconstructing from helical cone-beam Computerized Tomography (CT) data. We investigate two va...
Bruno M. Carvalho, Gabor T. Herman