Sciweavers

16430 search results - page 3072 / 3286
» On Computable Tree Functions
Sort
View
CCS
2007
ACM
14 years 2 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
CIVR
2007
Springer
180views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Probabilistic matching and resemblance evaluation of shapes in trademark images
We present a novel matching and similarity evaluation method for planar geometric shapes represented by sets of polygonal curves. Given two shapes, the matching algorithm randomly...
Helmut Alt, Ludmila Scharf, Sven Scholz
EMSOFT
2007
Springer
14 years 2 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
EMSOFT
2007
Springer
14 years 2 months ago
Proving the absence of run-time errors in safety-critical avionics code
We explain the design of the interpretation-based static analyzer Astr´ee and its use to prove the absence of run-time errors in safety-critical codes. Categories and Subject Des...
Patrick Cousot
GI
2007
Springer
14 years 2 months ago
Semantic Web Technologies for Power Grid Management
: Utility companies worldwide are facing a multitude of new challenges, which can not be met with the historically grown, monolithic IT systems currently in use. Service oriented a...
Mathias Uslar, Nikolai Dahlem
« Prev « First page 3072 / 3286 Last » Next »