Sciweavers

1886 search results - page 221 / 378
» Verifying and validating a simulation model
Sort
View
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
15 years 10 months ago
Consistency Issue on Live Systems Forensics
Volatile data, being vital to digital investigation, have become part of the standard items targeted in the course of live response to a computer system. In traditional computer f...
Frank Y. W. Law, K. P. Chow, Michael Y. K. Kwan, P...
136
Voted
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
15 years 7 months ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
GECCO
2007
Springer
189views Optimization» more  GECCO 2007»
15 years 7 months ago
A genetic algorithm with exon shuffling crossover for hard bin packing problems
A novel evolutionary approach for the bin packing problem (BPP) is presented. A simple steady-state genetic algorithm is developed that produces results comparable to other approa...
Philipp Rohlfshagen, John A. Bullinaria
ARCS
2004
Springer
15 years 7 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
FMCAD
2006
Springer
15 years 7 months ago
Post-reboot Equivalence and Compositional Verification of Hardware
We introduce a finer concept of a Hardware Machine, where the set of post-reboot operation states is explicitly a part of the FSM definition. We formalize an ad-hoc flow of combin...
Zurab Khasidashvili, Marcelo Skaba, Daher Kaiss, Z...