Sciweavers

759 search results - page 15 / 152
» Verification of a Microprocessor Using Real World Applicatio...
Sort
View
ESORICS
2010
Springer
14 years 10 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
FTCS
1998
114views more  FTCS 1998»
14 years 11 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
FPL
1999
Springer
103views Hardware» more  FPL 1999»
15 years 1 months ago
IP Validation for FPGAs Using Hardware Object Technology
Although verification and simulation tools are always improving, the results they provide remain hard to analyze and interpret. On one hand, verification sticks to the functional ...
Steve Casselman, John Schewel, Christophe Beaumont
SIGCSE
2009
ACM
161views Education» more  SIGCSE 2009»
15 years 2 months ago
An activity-based sensor networks course for undergraduates with sun spot devices
Wireless sensor networks are revolutionizing the instrumentation of the physical world, across scientific, industrial and military applications. In this paper, we describe our eff...
Damon Tyman, Nirupama Bulusu, Jens Mache
AVBPA
2005
Springer
319views Biometrics» more  AVBPA 2005»
15 years 3 months ago
A Study of Brute-Force Break-ins of a Palmprint Verification System
Abstract. Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has le...
Adams Wai-Kin Kong, David Zhang, Mohamed Kamel