Sciweavers

2236 search results - page 417 / 448
» Intrusion detection techniques and approaches
Sort
View
DAC
2007
ACM
14 years 8 months ago
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement
Negative bias temperature instability (NBTI) in MOSFETs is one of the major reliability challenges in nano-scale technology. This paper presents an efficient technique to characte...
Kunhyuk Kang, Kee-Jong Kim, Ahmad E. Islam, Muhamm...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 2 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
IPPS
2005
IEEE
14 years 1 months ago
Impact of Event Logger on Causal Message Logging Protocols for Fault Tolerant MPI
— Fault tolerance in MPI becomes a main issue in the HPC community. Several approaches are envisioned from user or programmer controlled fault tolerance to fully automatic fault ...
Aurelien Bouteiller, Boris Collin, Thomas Hé...
MM
2004
ACM
112views Multimedia» more  MM 2004»
14 years 1 months ago
LyricAlly: automatic synchronization of acoustic musical signals and textual lyrics
We present a prototype that automatically aligns acoustic musical signals with their corresponding textual lyrics, in a manner similar to manually-aligned karaoke. We tackle this ...
Ye Wang, Min-Yen Kan, Tin Lay Nwe, Arun Shenoy, Ju...
DATE
2003
IEEE
135views Hardware» more  DATE 2003»
14 years 1 months ago
Creating Value Through Test
Test is often seen as a necessary evil; it is a fact of life that ICs have manufacturing defects and those need to be filtered out by testing before the ICs are shipped to the cu...
Erik Jan Marinissen, Bart Vermeulen, Robert Madge,...