Sciweavers

15379 search results - page 96 / 3076
» Protecting users from
Sort
View
DAC
1999
ACM
14 years 8 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
DCC
2007
IEEE
14 years 7 months ago
High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source
We consider a first-order Markov source, which is predictively encoded using a DPCM-style encoder. The quantized compressed prediction residual is transmitted over an erasure chan...
Shantanu Rane, David Rebollo-Monedero, Bernd Girod
ICCAD
2006
IEEE
107views Hardware» more  ICCAD 2006»
14 years 4 months ago
Current path analysis for electrostatic discharge protection
The electrostatic discharge (ESD) problem has become a challenging reliability issue in nanometer circuit design. High voltages resulted from ESD might cause high current densitie...
Hung-Yi Liu, Chung-Wei Lin, Szu-Jui Chou, Wei-Ting...
PSD
2004
Springer
126views Database» more  PSD 2004»
14 years 1 months ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...
ACSAC
2003
IEEE
14 years 1 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello