Sciweavers

256 search results - page 10 / 52
» On the Placement of Software Mechanisms for Detection of Dat...
Sort
View
SOCO
2011
Springer
13 years 2 months ago
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms...
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof S...
COMPSAC
2008
IEEE
14 years 2 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
CASES
2006
ACM
14 years 1 months ago
Mitigating soft error failures for multimedia applications by selective data protection
With advances in process technology, soft errors (SE) are becoming an increasingly critical design concern. Due to their large area and high density, caches are worst hit by soft ...
Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, N...
CIMCA
2005
IEEE
14 years 1 months ago
Scenario Based Fault Detection in Context-Aware Ubiquitous Systems using Bayesian Networks
We define the use of Bayesian Networks for fault detection in the perception mechanism of context-aware ubiquitous systems. This paper1 describes the complete working of such a f...
Bilal Ahmed, Young-Koo Lee, Sungyoung Lee, Yonil Z...
DATE
2007
IEEE
79views Hardware» more  DATE 2007»
14 years 1 months ago
Utilization of SECDED for soft error and variation-induced defect tolerance in caches
Combination of SECDED with a redundancy technique can effectively tolerate a high variation-induced defect rate in future processes. However, while a defective cell in a block can...
Luong Dinh Hung, Hidetsugu Irie, Masahiro Goshima,...