Sciweavers

1273 search results - page 208 / 255
» Recovery from
Sort
View
IFIP
2005
Springer
14 years 1 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 1 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
ICFEM
2004
Springer
14 years 1 months ago
A Formal Monitoring-Based Framework for Software Development and Analysis
A formal framework for software development and analysis is presented, which aims at reducing the gap between formal specification and implementation by integrating the two and al...
Feng Chen, Marcelo d'Amorim, Grigore Rosu
DSN
2003
IEEE
14 years 1 months ago
Engineering Fault-Tolerant TCP/IP Servers Using FT-TCP
In a recent paper [2] we have proposed FT-TCP: an architecture that allows a replicated service to survive crashes without breaking its TCP connections. FT-TCP is attractive in pr...
Dmitrii Zagorodnov, Keith Marzullo, Lorenzo Alvisi...
DSN
2003
IEEE
14 years 1 months ago
On the Design of Robust Integrators for Fail-Bounded Control Systems
This paper describes the design and evaluation of a robust integrator for software-implemented control systems. The integrator is constructed as a generic component in the Simulin...
Jonny Vinter, Andréas Johansson, Peter Folk...