Sciweavers

279 search results - page 53 / 56
» Intellectual Property Metering
Sort
View
129
Voted
IH
1999
Springer
15 years 7 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
133
Voted
IWANN
1997
Springer
15 years 7 months ago
The Pattern Extraction Architecture: A Connectionist Alternative to the Von Neumann Architecture
A detailed connectionist architecture is described which is capable of relating psychological behavior to the functioning of neurons and neurochemicals. The need to be able to bui...
L. Andrew Coward
117
Voted
DAC
2010
ACM
15 years 7 months ago
Cost-driven 3D integration with interconnect layers
The ever increasing die area of Chip Multiprocessors (CMPs) affects manufacturing yield, resulting in higher manufacture cost. Meanwhile, network-on-chip (NoC) has emerged as a p...
Xiaoxia Wu, Guangyu Sun, Xiangyu Dong, Reetuparna ...
134
Voted
DRM
2006
Springer
15 years 7 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
120
Voted
ESEC
1997
Springer
15 years 7 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine