Sciweavers

521 search results - page 54 / 105
» Timing Verification Using HDTV
Sort
View
STTT
2010
113views more  STTT 2010»
14 years 4 months ago
Proved development of the real-time properties of the IEEE 1394 Root Contention Protocol with the event-B method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm
EUROMICRO
2000
IEEE
15 years 2 months ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
CDC
2010
IEEE
14 years 4 months ago
Tuning a synthetic in vitro oscillator using control-theoretic tools
Abstract-- This paper demonstrates the effectiveness of simple control-theoretic tools in generating simulation-guided experiments on a synthetic in vitro oscillator. A theoretical...
Christopher Sturk, Elisa Franco, Richard M. Murray
ICCV
2007
IEEE
15 years 11 months ago
A Study of Face Recognition as People Age
In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discard...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
14 years 11 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov