Sciweavers

1187 search results - page 172 / 238
» On Modeling Cross-Talk Faults
Sort
View
133
Voted
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
15 years 7 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
118
Voted
INFSOF
2002
147views more  INFSOF 2002»
15 years 3 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
156
Voted
SIGMETRICS
2002
ACM
104views Hardware» more  SIGMETRICS 2002»
15 years 3 months ago
Improving cluster availability using workstation validation
We demonstrate a framework for improving the availability of cluster based Internet services. Our approach models Internet services as a collection of interconnected components, e...
Taliver Heath, Richard P. Martin, Thu D. Nguyen
158
Voted
ASPLOS
2011
ACM
14 years 7 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
130
Voted
ICPR
2000
IEEE
16 years 4 months ago
Novelty Detection in Airframe Strain Data
The structural health of airframes is often monitored by analysis of the frequency of occurrence matrix (FOOM) produced after each flight. Each cell in the matrix records a stress...
Simon J. Hickinbotham, James Austin