Results 41 to 50 of about 394,890 (286)

Automated Synthesis of SEU Tolerant Architectures from OO Descriptions [PDF]

open access: yes, 2002
SEU faults are a well-known problem in aerospace environment but recently their relevance grew up also at ground level in commodity applications coupled, in this frame, with strong economic constraints in terms of costs reduction.
Chiusano, Silvia Anna   +2 more
core   +1 more source

Robust Schnorr-based subgroup multi-signature scheme

open access: yes网络与信息安全学报
The consensus mechanism has been considered as the core technology of blockchain systems. However, current consensus mechanisms have encountered three issues: low consensus efficiency, low reliability and security, and high computational complexity.
ZHANG Zhenqi, ZHU Qiuchi, WANG Zhiwei
doaj   +3 more sources

A Secure Communication Method Based on Message Hash Chain

open access: yesApplied Sciences, 2022
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery.
Mingxuan Han, Wenbao Jiang
doaj   +1 more source

EFFICIENT RELIABILITY AND UNCERTAINTY ASSESSMENT ON LIFELINE NETWORKS USING THE SURVIVAL SIGNATURE [PDF]

open access: yes, 2017
Lifeline networks, such as water distribution and transportation networks, are the backbone of our societies, and the study of their reliability of them is required.
Beer, Michael   +4 more
core   +2 more sources

Secure Routing in Wireless Mesh Networks [PDF]

open access: yes, 2011
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core   +3 more sources

Proxy Signature-Based Management Model of Sharing Energy Storage in Blockchain Environment

open access: yesApplied Sciences, 2020
Sharing energy storage (SES) is a novel business model in order to increase the profits and improve the utilization rate of idle energy storage facilities.
Yiting Wang   +7 more
doaj   +1 more source

On signature-based expressions of system reliability

open access: yesJournal of Multivariate Analysis, 2011
The concept of signature was introduced by Samaniego for systems whose components have i.i.d. lifetimes. This concept proved to be useful in the analysis of theoretical behaviors of systems. In particular, it provides an interesting signature-based representation of the system reliability in terms of reliabilities of k-out-of-n systems.
Waldhauser Tamás   +2 more
openaire   +5 more sources

Formally based semi-automatic implementation of an open security protocol [PDF]

open access: yes, 2012
International audienceThis paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal ...
Alfredo Pironti   +37 more
core   +3 more sources

Effect sizes and test-retest reliability of the fMRI-based neurologic pain signature

open access: yesNeuroImage, 2022
Identifying biomarkers that predict mental states with large effect sizes and high test-retest reliability is a growing priority for fMRI research. We examined a well-established multivariate brain measure that tracks pain induced by nociceptive input ...
Xiaochun Han   +12 more
doaj   +1 more source

A watchdog processor to detect data and control flow errors [PDF]

open access: yes, 2003
A watchdog processor for the MOTOROLA M68040 microprocessor is presented. Its main task is to protect from transient faults caused by SEUs the transmission of data between the processor and the system memory, and to ensure a correct instructions' flow ...
Benso, Alfredo   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy