Sciweavers

6978 search results - page 144 / 1396
» Reframing Requirements Analysis
Sort
View
SADFE
2007
IEEE
15 years 4 months ago
Toward Models for Forensic Analysis
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
15 years 3 months ago
Hybrid BIST Based on Repeating Sequences and Cluster Analysis
We present a hybrid BIST approach that extracts the most frequently occurring sequences from deterministic test patterns; these extracted sequences are stored on-chip. We use clus...
Lei Li, Krishnendu Chakrabarty
VOSS
2004
Springer
118views Mathematics» more  VOSS 2004»
15 years 3 months ago
Serial Disk-based Analysis of Large Stochastic Models
Abstract. The paper presents a survey of out-of-core methods available for the analysis of large Markov chains on single workstations. First, we discuss the main sparse matrix stor...
Rashid Mehmood
ER
2000
Springer
126views Database» more  ER 2000»
15 years 1 months ago
Tool Support for Reuse of Analysis Patterns - A Case Study
: The size and complexity of modern information systems together with requirements for short development time increase the demands for reuse of already existing solutions. The idea...
Petia Wohed

Publication
152views
15 years 1 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...