Sciweavers

1949 search results - page 298 / 390
» Protective Interface Specifications
Sort
View
CODES
2005
IEEE
15 years 8 months ago
The design of a smart imaging core for automotive and consumer applications: a case study
This paper describes the design of a low-cost, low-power smart imaging core that can be embedded in cameras. The core integrates an ARM 9 processor, a camera interface and two spe...
Wido Kruijtzer, Winfried Gehrke, Víctor Rey...
113
Voted
DATE
2005
IEEE
118views Hardware» more  DATE 2005»
15 years 8 months ago
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems
—Presented are a methodology and a DFII-based tool for AC-stability analysis of a wide variety of closed-loop continuous-time (operational amplifiers and other linear circuits). ...
Momchil Milev, Rod Burt
DSN
2005
IEEE
15 years 8 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
134
Voted
DSRT
2005
IEEE
15 years 8 months ago
Using Web Services and Data Mediation/Storage Services to Enable Command and Control to Simulation Interoperability
The Extensible Battle Management Language project has implemented XML based data mediation services to translate from legacy XML schemas into XML schemas, based on a common tag se...
Andreas Tolk, J. Mark Pullen
EUROMICRO
2005
IEEE
15 years 8 months ago
Developing Content-Intensive Applications with XML Documents, Document Transformations and Software Components
This paper describes DTC (Documents, Transformations and Components), our approach to the XML-based development of content-intensive applications. According to this approach, the ...
José Luis Sierra, Alfredo Fernández-...