We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Abstract-- This paper demonstrates the effectiveness of simple control-theoretic tools in generating simulation-guided experiments on a synthetic in vitro oscillator. A theoretical...
Christopher Sturk, Elisa Franco, Richard M. Murray
In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discard...
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...