We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications s...
Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, M...
Abstract. In this paper we present a study of the application of Evolutionary Computation methods to the optimisation of the start-up of a combined cycle power plant. We propose a ...
Ilaria Bertini, Matteo De Felice, Fabio Moretti, S...
Abstract—Wafer-level test during burn-in (WLTBI) has recently emerged as a promising technique to reduce test and burn-in costs in semiconductor manufacturing. However, the testi...
We consider probabilistic methods to compute the near midair collision risk using state estimate and covariance from a target tracking filter based on angle-only sensors such as ...
Wireless sensor networks (WSNs) have been proposed for a multitude of location-dependent applications. To stamp the collected data and facilitate communication protocols, it is nec...
Hongyang Chen, Pei Huang, Hing-Cheung So, Kaoru Se...