Sciweavers

1548 search results - page 214 / 310
» Estimating Software Vulnerabilities
Sort
View
FOCM
2010
108views more  FOCM 2010»
15 years 1 months ago
Parallelization Method for a Continuous Property
Abstract. An automated method of general purpose is introduced for computing a rigorous estimate of a bounded region in Rn whose points satisfy a given property. The method is base...
Pawel Pilarczyk
REALWSN
2010
14 years 10 months ago
An Experimental Study on IEEE 802.15.4 Multichannel Transmission to Improve RSSI-Based Service Performance
Abstract. In Wireless Sensor Networks (WSNs) the majority of the devices provide access to the Received Signal Strength Indicator (RSSI), which has been used as a means to enable d...
Andrea Bardella, Nicola Bui, Andrea Zanella, Miche...
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
15 years 8 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
IOLTS
2003
IEEE
124views Hardware» more  IOLTS 2003»
15 years 8 months ago
Designing FPGA based Self-Testing Checkers for m-out-of-n Codes
The paper describes a specific method for designing selfchecking checkers for m-out-of-n codes. The method is oriented to the Field Programmable Gate Arrays technology and is base...
A. Matrosova, Vladimir Ostrovsky, Ilya Levin, K. N...
ISSRE
2003
IEEE
15 years 8 months ago
Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction
Prior research has suggested that the failure rates of faults follow a log normal distribution. We propose a specific model where distributions close to a log normal arise natural...
Peter G. Bishop, Robin E. Bloomfield