Sciweavers

285 search results - page 26 / 57
» Performance and Functional Verification of Microprocessors
Sort
View
254
Voted
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 5 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
137
Voted
FM
2006
Springer
126views Formal Methods» more  FM 2006»
15 years 7 months ago
Towards Modularized Verification of Distributed Time-Triggered Systems
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...
120
Voted
AVBPA
2003
Springer
190views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Combining Face and Iris Biometrics for Identity Verification
Face and iris identification have been employed in various biometric applications. Besides improving the verification performance, the fusion of both of the biometrics has several ...
Yunhong Wang, Tieniu Tan, Anil K. Jain
ESMART
2001
Springer
15 years 8 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
125
Voted
ACMSE
2004
ACM
15 years 9 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...