Sciweavers

2421 search results - page 53 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICIP
2002
IEEE
15 years 22 days ago
A blind watermarking technique in JPEG compressed domain
We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coefficients are extracted to form an M-dimensional vector. Watermar...
Oscar C. Au, Peter H. W. Wong
ASPDAC
2010
ACM
135views Hardware» more  ASPDAC 2010»
13 years 9 months ago
Efficient power grid integrity analysis using on-the-fly error check and reduction
In this paper, we present a new voltage IR drop analysis approach for large on-chip power delivery networks. The new approach is based on recently proposed sampling based reductio...
Duo Li, Sheldon X.-D. Tan, Ning Mi, Yici Cai
CHARME
2005
Springer
136views Hardware» more  CHARME 2005»
14 years 4 months ago
Predictive Reachability Using a Sample-Based Approach
Abstract. Unbounded model checking of invariant properties is typically solved using symbolic reachability. However, BDD based reachability methods suffer from lack of robustness ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...
IWIA
2003
IEEE
14 years 4 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
IFIP3
1998
151views Education» more  IFIP3 1998»
14 years 15 days ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...