Sciweavers

1187 search results - page 172 / 238
» On Modeling Cross-Talk Faults
Sort
View
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
14 years 22 days ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
INFSOF
2002
147views more  INFSOF 2002»
13 years 8 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
SIGMETRICS
2002
ACM
104views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Improving cluster availability using workstation validation
We demonstrate a framework for improving the availability of cluster based Internet services. Our approach models Internet services as a collection of interconnected components, e...
Taliver Heath, Richard P. Martin, Thu D. Nguyen
ASPLOS
2011
ACM
13 years 10 days ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
ICPR
2000
IEEE
14 years 9 months ago
Novelty Detection in Airframe Strain Data
The structural health of airframes is often monitored by analysis of the frequency of occurrence matrix (FOOM) produced after each flight. Each cell in the matrix records a stress...
Simon J. Hickinbotham, James Austin