Sciweavers

28 search results - page 3 / 6
» Dependability and its threats - A taxonomy
Sort
View
ICIP
2006
IEEE
13 years 11 months ago
Optimal Display Adaptation of Iconic Document Visualizations via BFOS-Style Tree Pruning
This paper introduces a new visual representation of a document or group of documents, a Dynamic Document Icon, or Dydocon. Its representation is symbolic like an icon, but change...
Kathrin Berkner, Michael J. Gormish
JBI
2006
13 years 5 months ago
Conceptualizing the world: Lessons from history
Throughout history, philosophers, scientists, and other scholars have named and organized the salient elements of the world. These efforts have led to conceptualizations that diff...
Alexa T. McCray
CIIA
2009
13 years 6 months ago
A Study on the Convergence of FingerHashing and a Secured Biometric System
Because biometrics-based authentication offers several advantages face to other authentication methods, it is important that such systems be designed to withstand attacks. Reliabil...
Rima Belguechi, Christophe Rosenberger
DSN
2004
IEEE
13 years 9 months ago
An Architectural Framework for Providing Reliability and Security Support
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability and Security Engine (RSE)...
Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. ...
ASPDAC
2007
ACM
98views Hardware» more  ASPDAC 2007»
13 years 7 months ago
A Software Technique to Improve Yield of Processor Chips in Presence of Ultra-Leaky SRAM Cells Caused by Process Variation
- Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower threshold voltage and its increased variation. Such leaky transistors may e...
Maziar Goudarzi, Tohru Ishihara, Hiroto Yasuura