Sciweavers

1616 search results - page 279 / 324
» Robust game theory
Sort
View
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
14 years 3 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji
DATE
2007
IEEE
145views Hardware» more  DATE 2007»
14 years 3 months ago
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508
This paper proposes an innovative methodology to perform and validate a Failure Mode and Effects Analysis (FMEA) at System-on-Chip (SoC) level. This is done in compliance with the...
Riccardo Mariani, Gabriele Boschi, Federico Colucc...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
ATAL
2007
Springer
14 years 3 months ago
Integrating authority, deontics, and communications within a joint intention framework
Many agents are fielded within environments requiring modeling traditional organizational structures such as military hierarchies and corporations, with their associated authority...
Marcus J. Huber, Sanjeev Kumar, David McGee, Sean ...
ESORICS
2007
Springer
14 years 3 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...