Sciweavers

1518 search results - page 214 / 304
» Cryptographic Test Correction
Sort
View
VTC
2006
IEEE
138views Communications» more  VTC 2006»
15 years 9 months ago
Simulated Annealing based Wireless Sensor Network Localization with Flip Ambiguity Mitigation
Abstract— Accurate self-localization capability is highly desirable in wireless sensor networks. A major problem in wireless sensor network localization is the flip ambiguity, w...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
VTS
2006
IEEE
93views Hardware» more  VTS 2006»
15 years 9 months ago
Upper Bounding Fault Coverage by Structural Analysis and Signal Monitoring
A new algorithm for identifying stuck faults in combinational circuits that cannot be detected by a given input sequence is presented. Other than pre and post-processing steps, ce...
Vishwani D. Agrawal, Soumitra Bose, Vijay Gangaram
3DGIS
2006
Springer
15 years 9 months ago
Texture Generation and Mapping Using Video Sequences for 3D Building Models
Abstract Three-dimensional (3D) building model is one of the most important components in a cyber city implementation and application. This study developed an effective and highly ...
Fuan Tsai, Cheng-Hsuan Chen, Jin-Kim Liu, Kuo-Hsin...
114
Voted
ASPLOS
2006
ACM
15 years 9 months ago
HeapMD: identifying heap-based bugs using anomaly detection
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds heap-based bugs using anomaly detection. HeapMD is based upon the observation ...
Trishul M. Chilimbi, Vinod Ganapathy
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 9 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...