Sciweavers

639 search results - page 83 / 128
» About Norms and Causes
Sort
View
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
15 years 5 months ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar
DATE
2010
IEEE
161views Hardware» more  DATE 2010»
15 years 5 months ago
BISD: Scan-based Built-In self-diagnosis
Abstract—Built-In Self-Test (BIST) is less often applied to random logic than to embedded memories due to the following reasons: Firstly, for a satisfiable fault coverage it may...
Melanie Elm, Hans-Joachim Wunderlich
APSEC
2002
IEEE
15 years 4 months ago
Using Process Simulation to Compare Scheduling Strategies for Software Projects
We present a discrete simulation model for software projects which explicitly takes a scheduling strategy as input. The model represents varying staff skill levels, component coup...
Frank Padberg
ICECCS
2002
IEEE
85views Hardware» more  ICECCS 2002»
15 years 4 months ago
Syntactic Fault Patterns in OO Programs
Although program faults are widely studied, there are many aspects of faults that we still do not understand, particularly about OO software. In addition to the simple fact that o...
Roger T. Alexander, Jeff Offutt, James M. Bieman
ISSRE
2002
IEEE
15 years 4 months ago
Fault Contribution Trees for Product Families
Software Fault Tree Analysis (SFTA) provides a structured way to reason about the safety or reliability of a software system. As such, SFTA is widely used in missioncritical appli...
Dingding Lu, Robyn R. Lutz