Sciweavers

PRDC
2015
IEEE
8 years 8 months ago
Deriving Hierarchical Safety Contracts
—Safety cases need significant amount of time and effort to produce. The required amount of time and effort can be dramatically increased due to system changes as safety cases s...
Omar Jaradat, Iain Bate
PRDC
2015
IEEE
8 years 8 months ago
Optimizing Sensor Nodes Placement for Fault-Tolerant Trilateration-Based Localization
Abstract—As computing systems become increasingly pervasive, the number of applications that can benefit from or require localization capabilities continuously increases. In ind...
Katarina Balac, Mauro Prevostini, Miroslaw Malek
PRDC
2015
IEEE
8 years 8 months ago
Using Safety Contracts to Guide the Integration of Reusable Safety Elements within ISO 26262
Safety-critical systems usually need to be compliant with a domainspecific safety standard, which in turn requires an explained and wellfounded body of evidence to show that the ...
Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans H...
PRDC
2015
IEEE
8 years 8 months ago
Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring
—The applicability of wireless sensor networks (WSNs) to data-intensive structural health monitoring (SHM) is being heavily studied recently by the computer science domain. The a...
Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xia...
PRDC
2015
IEEE
8 years 8 months ago
Scheduling Independent Tasks with Voltage Overscaling
Abstract—In this paper, we discuss several scheduling algorithms to execute independent tasks with voltage overscaling. Given a frequency to execute the tasks, operating at a vol...
Aurélien Cavelan, Yves Robert, Hongyang Sun...
PERVASIVE
2015
Springer
8 years 8 months ago
Security and Privacy Implications of Pervasive Memory Augmentation
Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of widespread p...
ARITH
2015
IEEE
8 years 8 months ago
RNS Arithmetic Approach in Lattice-Based Cryptography: Accelerating the "Rounding-off" Core Procedure
Abstract—Residue Number Systems (RNS) are naturally considered as an interesting candidate to provide efficient arithmetic for implementations of cryptosystems such as RSA, ECC ...
Jean-Claude Bajard, Julien Eynard, Nabil Merkiche,...
ARITH
2015
IEEE
8 years 8 months ago
Modular Multiplication and Division Algorithms Based on Continued Fraction Expansion
In this paper, we apply results on number systems based on continued fraction expansions to modular arithmetic. We provide two new algorithms in order to compute modular multiplic...
Mourad Gouicem
ARITH
2015
IEEE
8 years 8 months ago
Reproducible Tall-Skinny QR
—Reproducibility is the ability to obtain bitwise identical results from different runs of the same program on the same input data, regardless of the available computing resource...
Hong Diep Nguyen, James Demmel
ARITH
2015
IEEE
8 years 8 months ago
Semi-Automatic Floating-Point Implementation of Special Functions
Abstract—This work introduces an approach to the computerassisted implementation of mathematical functions geared toward special functions such as those occurring in mathematical...
Christoph Quirin Lauter, Marc Mezzarobba