Sciweavers

1446 search results - page 102 / 290
» Formal analysis of hardware requirements
Sort
View
CSFW
2007
IEEE
14 years 3 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
CAV
2005
Springer
110views Hardware» more  CAV 2005»
14 years 2 months ago
Extended Weighted Pushdown Systems
Recent work on weighted-pushdown systems shows how to generalize interprocedural-dataflow analysis to answer “stack-qualified queries”, which answer the question “what data...
Akash Lal, Thomas W. Reps, Gogul Balakrishnan
IFIP
2010
Springer
13 years 4 months ago
Reasoning about Skills and Competencies
Human Resources Management (HRM) is the strategic management of the employees, who individually and collectively contribute to the achievement of the strategic goals of an organiza...
Maryam Fazel-Zarandi, Mark S. Fox
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 2 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
SPAA
2003
ACM
14 years 2 months ago
Analysis of link reversal routing algorithms for mobile ad hoc networks
Link reversal algorithms provide a simple mechanism for routing in mobile ad hoc networks. These algorithms maintain routes to any particular destination in the network, even when...
Costas Busch, Srikanth Surapaneni, Srikanta Tirtha...