Sciweavers

83 search results - page 5 / 17
» Deviation Analysis Through Model Checking
Sort
View
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ENGL
2008
133views more  ENGL 2008»
13 years 7 months ago
Cycle Time Forecasting Models for Defect Inspection Process in TFT-LCD Module Assembly
Because most of the procedures in defect inspection process of TFT-LCD module assembly are examined manually through human vision, cycle time estimation for this particular process...
Chien-wen Shen
SAFECOMP
2010
Springer
13 years 6 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska
POLICY
2005
Springer
14 years 1 months ago
Using Linear Temporal Model Checking for Goal-Oriented Policy Refinement Frameworks
Policy refinement is meant to derive lower-level policies from higher-level ones so that these more specific policies are better suited for use in different execution environments...
Javier Rubio-Loyola, Joan Serrat, Marinos Charalam...

Publication
576views
15 years 7 months ago
Within-die Process Variations: How Accurately can They Be Statistically Modeled?
Within-die process variations arise during integrated circuit (IC) fabrication in the sub-100nm regime. These variations are of paramount concern as they deviate the performance of...
Brendan Hargreaves, Henrik Hult, Sherief Reda