Sciweavers

1222 search results - page 169 / 245
» Verifying a File System Implementation
Sort
View
FDL
2006
IEEE
15 years 6 months ago
Verification-Oriented Behavioral Modeling of Non-Linear Analog
In this work, an approach to the `verification-oriented' modeling of the analog parts' behavior of mixed-signal circuits is presented. Starting from a continuous-time, c...
Martin Freibothe, Jens Doege, Torsten Coym, Stefan...
FMCAD
2000
Springer
15 years 6 months ago
Model Checking Synchronous Timing Diagrams
Abstract. Model checking is an automated approach to the formal verification of hardware and software. To allow model checking tools to be used by the hardware or software designer...
Nina Amla, E. Allen Emerson, Robert P. Kurshan, Ke...
139
Voted
SNPD
2007
15 years 3 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
105
Voted
WCE
2007
15 years 3 months ago
A mathematical study of the pantograph/catenary dynamic interaction on transition spans
—This paper presents the work carried out by CALPE team on the development of a mathematical model used in the study and simulation of the pantograph-catenarydynamic interaction ...
Jesús Benet, Angelines Alberto, Enrique Ari...
IJNSEC
2008
166views more  IJNSEC 2008»
15 years 2 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang