Sciweavers

327 search results - page 51 / 66
» The Effect of Detail on Ethernet Simulation
Sort
View
CHARME
1997
Springer
105views Hardware» more  CHARME 1997»
13 years 11 months ago
Simulation-based verification of network protocols performance
Formal verification techniques need to deal with the complexity of the systems rified. Most often, this problem is solved by taking an abstract model of the system and aiming at a...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Pa...
EIT
2008
IEEE
13 years 9 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
HCI
2007
13 years 8 months ago
Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty
In pursuing the ultimate goal of enabling intelligent conversation with a virtual human, two key challenges are selecting nonverbal behaviors to implement and realizing those behav...
Insuk Oh, Matthew Stone
DSP
2008
13 years 7 months ago
Phase dependence mitigation for autocorrelation-based frequency estimation
The sinusoidal frequency estimation from short data records based on Toeplitz autocorrelation (AC) matrix estimates suffer from the dependence on the initial phases of the sinusoi...
Mustafa A. Altinkaya, Emin Anarim, Bülent San...
TON
2008
75views more  TON 2008»
13 years 7 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson