Sciweavers

1177 search results - page 193 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
DAC
2005
ACM
14 years 9 months ago
Hardware speech recognition for user interfaces in low cost, low power devices
We propose a system architecture for real-time hardware speech recognition on low-cost, power-constrained devices. The system is intended to support real-time speech-based user in...
Sergiu Nedevschi, Rabin K. Patra, Eric A. Brewer
WPES
2006
ACM
14 years 2 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
DAC
1998
ACM
14 years 9 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
DAGSTUHL
1993
13 years 10 months ago
Supporting continuous media applications in a micro-kernel environment
Currently, popular operating systems are unable to support the end-toend real-time requirements of distributed continuous media. Furthermore, the integration of continuous media c...
Geoff Coulson, Gordon S. Blair, Philippe Robin, Do...
DAC
2004
ACM
14 years 2 months ago
Large-scale placement by grid-warping
Grid-warping is a new placement algorithm based on a strikingly simple idea: rather than move the gates to optimize their location, we elastically deform a model of the 2-0 chip s...
Zhong Xiu, James D. Z. Ma, Suzanne M. Fowler, Rob ...