Sciweavers

451 search results - page 35 / 91
» Relationless Completeness and Separations
Sort
View
119
Voted
VLSID
2004
IEEE
168views VLSI» more  VLSID 2004»
16 years 3 months ago
VLSI Implementation of Visible Watermarking for a Secure Digital Still Camera Design
Watermarking is the process that embeds data called a watermark into a multimedia object for its copyright protection. The digital watermarks can be visible to a viewer on careful...
Saraju P. Mohanty, Nagarajan Ranganathan, Ravi Nam...
109
Voted
CADE
2002
Springer
16 years 3 months ago
Basic Syntactic Mutation
Modularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Michael Abbott, Neil Ghani, and Christoph L?uth Union of Equational Theo...
Christopher Lynch, Barbara Morawska
IEEEARES
2010
IEEE
15 years 10 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
151
Voted
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
15 years 10 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...
61
Voted
ICRA
2009
IEEE
134views Robotics» more  ICRA 2009»
15 years 10 months ago
Combining search and action for mobile robots
— We explore the interconnection between search and action in the context of mobile robotics. The task of searching for an object and then performing some action with that object...
Geoffrey Hollinger, Dave Ferguson, Siddhartha Srin...