Sciweavers

6413 search results - page 20 / 1283
» Classes of cycle bases
Sort
View
ISECS
2008
IEEE
15 years 4 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
VTS
2007
IEEE
203views Hardware» more  VTS 2007»
15 years 4 months ago
Multiple Bit Upset Tolerant Memory Using a Selective Cycle Avoidance Based SEC-DED-DAEC Code
Conventional error correcting code (ECC) schemes used in memories and caches cannot correct double bit errors caused by a single event upset (SEU). As memory density increases, mu...
Avijit Dutta, Nur A. Touba
SPIN
2005
Springer
15 years 3 months ago
Sound Transaction-Based Reduction Without Cycle Detection
Vladimir Levin, Robert Palmer, Shaz Qadeer, Sriram...