Sciweavers

1886 search results - page 221 / 378
» Verifying and Validating Simulation Models
Sort
View
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
15 years 9 months ago
Consistency Issue on Live Systems Forensics
Volatile data, being vital to digital investigation, have become part of the standard items targeted in the course of live response to a computer system. In traditional computer f...
Frank Y. W. Law, K. P. Chow, Michael Y. K. Kwan, P...
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
15 years 7 months ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
GECCO
2007
Springer
189views Optimization» more  GECCO 2007»
15 years 7 months ago
A genetic algorithm with exon shuffling crossover for hard bin packing problems
A novel evolutionary approach for the bin packing problem (BPP) is presented. A simple steady-state genetic algorithm is developed that produces results comparable to other approa...
Philipp Rohlfshagen, John A. Bullinaria
ARCS
2004
Springer
15 years 6 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
FMCAD
2006
Springer
15 years 6 months ago
Post-reboot Equivalence and Compositional Verification of Hardware
We introduce a finer concept of a Hardware Machine, where the set of post-reboot operation states is explicitly a part of the FSM definition. We formalize an ad-hoc flow of combin...
Zurab Khasidashvili, Marcelo Skaba, Daher Kaiss, Z...