Sciweavers

1886 search results - page 33 / 378
» Verifying and validating a simulation model
Sort
View
CASES
2010
ACM
14 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
98
Voted
EUROCRYPT
2010
Springer
15 years 29 days ago
Constructing Verifiable Random Functions with Large Input Spaces
We present a family of verifiable random functions which are provably secure for exponentially-large input spaces under a non-interactive complexity assumption. Prior construction...
Susan Hohenberger, Brent Waters
60
Voted
ICRA
2010
IEEE
121views Robotics» more  ICRA 2010»
14 years 8 months ago
Real-world validation of three tipover algorithms for mobile robots
— Mobile robot tipover is a concern as it can create dangerous situations for operators and bystanders, cause collateral damage to the surrounding environment, and result in an a...
Philip R. Roan, Aaron Burmeister, Amin Rahimi, Kev...
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
15 years 2 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
RSP
2006
IEEE
125views Control Systems» more  RSP 2006»
15 years 3 months ago
Creation and Validation of Embedded Assertion Statecharts
This paper addresses the need to integrate formal assertions into the modeling, implementation, and testing of statechart based designs. The paper describes an iterative process f...
Doron Drusinsky, Man-tak Shing, Kadir Alpaslan Dem...