Sciweavers

1336 search results - page 169 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
DAC
2003
ACM
16 years 4 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
135
Voted
BMCBI
2004
128views more  BMCBI 2004»
15 years 3 months ago
Structural characterization of genomes by large scale sequence-structure threading: application of reliability analysis in struc
Background: We establish that the occurrence of protein folds among genomes can be accurately described with a Weibull function. Systems which exhibit Weibull character can be int...
Artem Cherkasov, Shannan J. Ho Sui, Robert C. Brun...
133
Voted
ENTCS
2002
139views more  ENTCS 2002»
15 years 3 months ago
Automatic Verification of the IEEE-1394 Root Contention Protocol with KRONOS and PRISM
We report on the automatic verification of timed probabilistic properties of the IEEE 1394 root contention protocol combining two existing tools: the real-time modelchecker Kronos...
Conrado Daws, Marta Z. Kwiatkowska, Gethin Norman
102
Voted
IJON
2006
71views more  IJON 2006»
15 years 3 months ago
A neurocomputational model of stochastic resonance and aging
Stochastic resonance (SR) is fundamental to physical and biological processes. Here, we use a stochastic gain-tuning model to investigate interactions between aging-related increa...
Shu-Chen Li, Timo von Oertzen, Ulman Lindenberger
AIA
2006
15 years 5 months ago
Speeding Up Model-based Diagnosis by a Heuristic Approach to Solving SAT
Model-based diagnosis of technical systems requires both a simulation machinery and a logic calculus. The former is responsible for the system's behavior analysis, the latter...
Benno Stein, Oliver Niggemann, Theodor Lettmann