Sciweavers

1187 search results - page 69 / 238
» On Modeling Cross-Talk Faults
Sort
View
CVPR
2004
IEEE
14 years 10 months ago
Automatic Method for Correlating Horizons across Faults in 3D Seismic Data
Horizons are visible boundaries between certain sediment layers in seismic data, and a fault is a crack of horizons and it is recognized in seismic data by the discontinuities of ...
Fitsum Admasu, Klaus D. Tönnies
ISSRE
2007
IEEE
13 years 10 months ago
Fault Prediction using Early Lifecycle Data
The prediction of fault-prone modules in a software project has been the topic of many studies. In this paper, we investigate whether metrics available early in the development li...
Yue Jiang, Bojan Cukic, Tim Menzies
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 3 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
14 years 14 days ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...