Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
This paper discusses the adoption of Embedded Deterministic Test (EDT) at Infineon Technologies as a means to reduce the cost of manufacturing test without compromising test quali...
Frank Poehl, Matthias Beck, Ralf Arnold, Peter Muh...
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...
Compressed sensing (CS) has recently emerged as a powerful signal acquisition paradigm. In essence, CS enables the recovery of high-dimensional sparse signals from relatively few ...
Jarvis Haupt, Waheed Uz Zaman Bajwa, Gil M. Raz, R...