Sciweavers

551 search results - page 12 / 111
» Preventing existence
Sort
View
61
Voted
IOLTS
2008
IEEE
112views Hardware» more  IOLTS 2008»
15 years 3 months ago
A Modular Memory BIST for Optimized Memory Repair
An efficient on-chip infrastructure for memory test and repair is crucial to enhance yield and availability of SoCs. Most of the existing built-in self-repair solutions reuse IP-C...
Philipp Öhler, Alberto Bosio, Giorgio Di Nata...
INFOCOM
2011
IEEE
14 years 26 days ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
OOPSLA
2007
Springer
15 years 3 months ago
Tools for enforcing and inferring reference immutability in Java
Accidental mutation is a major source of difficult-to-detect errors in object-oriented programs. We have built tools that detect and prevent such errors. The tools include a java...
Telmo Luis Correa Jr., Jaime Quinonez, Michael D. ...
IEEEARES
2006
IEEE
15 years 3 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
AOSE
2001
Springer
15 years 1 months ago
Specifying Agent Interaction Protocols with Standard UML
In this paper, I will demonstrate how the Unified Modeling Language (UML) can be used to describe agent interaction protocols. The approach that is presented in this paper does no...
Jürgen Lind