Sciweavers

380 search results - page 45 / 76
» Time Capsule Signature
Sort
View
EDCC
1999
Springer
14 years 23 days ago
Transparent Word-Oriented Memory BIST Based on Symmetric March Algorithms
Abstract. The paper presents a new approach to transparent BIST for wordoriented RAMs which is based on the transformation of March transparent test algorithms to the symmetric ver...
Vyacheslav N. Yarmolik, I. V. Bykov, Sybille Helle...
IJCAI
2001
13 years 10 months ago
Distributed Monitoring of Hybrid Systems: A model-directed approach
This paper presents an efficient online mode estimation algorithm for a class of sensor-rich, distributed embedded systems, the so-called hybrid systems. A central problem in dist...
Feng Zhao, Xenofon D. Koutsoukos, Horst W. Haussec...
ACISP
2010
Springer
13 years 6 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
ICDM
2010
IEEE
117views Data Mining» more  ICDM 2010»
13 years 6 months ago
Node Similarities from Spreading Activation
In this paper we propose two methods to derive two different kinds of node similarities in a network based on their neighborhood. The first similarity measure focuses on the overla...
Kilian Thiel, Michael R. Berthold
ACSAC
2000
IEEE
14 years 28 days ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine