Sciweavers

327 search results - page 55 / 66
» Fault emulation: a new approach to fault grading
Sort
View
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 1 months ago
Security Evaluation of Asynchronous Circuits
Abstract. Balanced asynchronous circuits have been touted as a superior replacement for conventional synchronous circuits. To assess these claims, we have designed, manufactured an...
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li,...
POS
1992
Springer
13 years 12 months ago
Supporting Large Persistent Stores using Conventional Hardware
Persistent programming systems are generally supported by an object store, a conceptually infinite object repository. Objects in such a repository cannot be directly accessed by u...
Francis Vaughan, Alan Dearle
IADIS
2003
13 years 9 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
WCE
2007
13 years 9 months ago
Human error of commission modeled with Theory of Games
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...
Selva S. Rivera, Jorge E. Núñez Mc L...
MONET
2011
13 years 2 months ago
On Adaptive Density Deployment to Mitigate the Sink-Hole Problem in Mobile Sensor Networks
Abstract The use of mobile sensors is of great relevance to monitor critical areas where sensors cannot be deployed manually. The presence of data collector sinks causes increased ...
Novella Bartolini, Tiziana Calamoneri, Annalisa Ma...