Sciweavers

6960 search results - page 968 / 1392
» Continuity Analysis of Programs
Sort
View
AINA
2008
IEEE
15 years 11 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
CDC
2008
IEEE
144views Control Systems» more  CDC 2008»
15 years 11 months ago
Control software model checking using bisimulation functions for nonlinear systems
— This paper extends a method for integrating source-code model checking with dynamic system analysis to verify properties of controllers for nonlinear dynamic systems. Source-co...
James Kapinski, Alexandre Donzé, Flavio Ler...
DFT
2008
IEEE
138views VLSI» more  DFT 2008»
15 years 11 months ago
Exploring Density-Reliability Tradeoffs on Nanoscale Substrates: When do smaller less reliable devices make sense?
It is widely recognized that device and interconnect fabrics at the nanoscale will be characterized by an increased susceptibility to transient faults. This appears to be intrinsi...
Andrey V. Zykov, Gustavo de Veciana
DFT
2008
IEEE
117views VLSI» more  DFT 2008»
15 years 11 months ago
Impact of Technology and Voltage Scaling on the Soft Error Susceptibility in Nanoscale CMOS
With each technology node shrink, a silicon chip becomes more susceptible to soft errors. The susceptibility further increases as the voltage is scaled down to save energy. Based ...
Vikas Chandra, Robert C. Aitken
EDOC
2008
IEEE
15 years 11 months ago
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method
The cost of a telecom service development is correlated to the discontinuity and the complexity of the process. To solve this problem, we propose a method dedicated to telecom ser...
Jacques Simonin, Francis Alizon, Jean-Pierre Desch...