Sciweavers

1448 search results - page 123 / 290
» From Requirements to Code Revisited
Sort
View
ICC
2000
IEEE
147views Communications» more  ICC 2000»
15 years 8 months ago
Average Power Reduction Techniques for Multiple-Subcarrier Intensity-Modulated Optical Signals
Abstract—We describe two classes of simple, effective techniques for reducing the average optical power requirement in intensity-modulated optical systems using multiple BPSK or ...
Roy You, Joseph M. Kahn
CRYPTO
2012
Springer
219views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic de...
Feng-Hao Liu, Anna Lysyanskaya
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
16 years 4 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
ISSTA
2006
ACM
15 years 10 months ago
Towards regression test selection for AspectJ programs
Regression testing aims at showing that code has not been adversely affected by modification activities during maintenance. Regression test selection techniques reuse tests from...
Jianjun Zhao, Tao Xie, Nan Li
DSN
2003
IEEE
15 years 9 months ago
Integrating Recovery Strategies into a Primary Substation Automation System
The DepAuDE architecture provides middleware to integrate fault tolerance support into distributed embedded automation applications. It allows error recovery to be expressed in te...
Geert Deconinck, Vincenzo De Florio, Ronnie Belman...