Sciweavers

ETS
2007
IEEE
128views Hardware» more  ETS 2007»
13 years 10 months ago
Selecting Power-Optimal SBST Routines for On-Line Processor Testing
Software-Based Self-Test (SBST) has emerged as an effective strategy for on-line testing of processors integrated in non-safety critical embedded system applications. Among the mo...
Andreas Merentitis, Nektarios Kranitis, Antonis M....
ECMDAFA
2007
Springer
84views Hardware» more  ECMDAFA 2007»
13 years 10 months ago
A Practical Approach to Model Extension
In object technology, reusability is achieved primarily through class inheritance. In model engineering, where reusability is also important, it should be possible to extend a mode...
Mikaël Barbero, Frédéric Jouaul...
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 10 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 10 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 10 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
DSD
2007
IEEE
131views Hardware» more  DSD 2007»
13 years 10 months ago
Design and Implementation of a 50MHZ DXT CoProcessor
Mohammad Amin Amiri, Reza Ebrahimi Atani, Sattar M...
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
13 years 10 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
DDECS
2007
IEEE
133views Hardware» more  DDECS 2007»
13 years 10 months ago
Prototyping Generators for On-line Test Vector Generation Based on PSL Properties
— From an assumed property, which constrains the inputs of a design under test, we produce a RTL synthesizable design that generates compliant sequences of values for all the sig...
Yann Oddos, Katell Morin-Allory, Dominique Borrion...
ISQED
2010
IEEE
128views Hardware» more  ISQED 2010»
13 years 10 months ago
A novel all-digital fractional-N frequency synthesizer architecture with fast acquisition and low spur
Digital implementation of analog function is becoming attractive in CMOS ICs, given the low supply voltage of ultra-scaled process. The conventional fractional-N frequency synthes...
Jun Zhao, Yong-Bin Kim
COMPSYSTECH
2007
13 years 10 months ago
Computer-based plagiarism detection methods and tools: an overview
: The paper is dedicated to plagiarism problem. The ways how to reduce plagiarism: both: plagiarism prevention and plagiarism detection are discussed. Widely used plagiarism detect...
Romans Lukashenko, Vita Graudina, Janis Grundspenk...