Sciweavers

167 search results - page 3 / 34
» Robust Techniques for Watermarking Sequential Circuit Design...
Sort
View
DAC
2009
ACM
14 years 8 months ago
Computing bounds for fault tolerance using formal techniques
Continuously shrinking feature sizes result in an increasing susceptibility of circuits to transient faults, e.g. due to environmental radiation. Approaches to implement fault tol...
André Sülflow, Görschwin Fey, Rol...
DAC
2005
ACM
13 years 9 months ago
Constraint-aware robustness insertion for optimal noise-tolerance enhancement in VLSI circuits
Reliability of nanometer circuits is becoming a major concern in today’s VLSI chip design due to interferences from multiple noise sources as well as radiation-induced soft erro...
Chong Zhao, Yi Zhao, Sujit Dey
ISMVL
2002
IEEE
106views Hardware» more  ISMVL 2002»
14 years 11 days ago
Design of Ternary Schmitt Triggers Based on Its Sequential Characteristics
By analyzing the working characteristics of binary Schmitt circuits we find their sequential characteristics, which makes us follow the method of sequential circuits to design Sch...
Yinshui Xia, Xunwei Wu, Penjung Wang
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 1 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
IWDW
2005
Springer
14 years 29 days ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...