Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Stephen W. Neville"'
Publikováno v:
IEEE Access, Vol 11, Pp 21417-21426 (2023)
The design of countermeasures against integrated circuit counterfeit recycling requires the ability to simulate aging in CMOS devices. Electronic design automation tools commonly provide this ability; however, their models must be tuned for use with
Externí odkaz:
https://doaj.org/article/325b13cdc031482593e03939c59c22ad
Publikováno v:
Mathematics of Computation. 87:855-877
Publikováno v:
MWSCAS
Counterfeiting of integrated circuits (ICs) by re-cycling used components poses a recognized threat to critical systems reliability. The explosive growth of the internet of things is likely to exacerbate the problem. There is a pressing need for econ
Autor:
Robert O'Dywer, Stephen W. Neville
Publikováno v:
PACRIM
Cloud-deployed Software-as-a-Service (SaaS) solutions have become a common global software deployment regime. For SaaS providers success is increasingly tied to social media feedback, customer reviews, and referrals. As such, ensuring sufficiently fe
Publikováno v:
PACRIM
Container-based Software-as-a-Service (SaaS) systems are rapidly emerging as a dominate cloud deployment paradigm, as supported via Docker, etc. This has opened new research avenues as lighter-weight containers replace heavier-weight virtual machines
Publikováno v:
IEEE Transactions on Computers. 63:917-926
This paper presents flott, a fast, low memory T-transform algorithm which can be used to compute the string complexity measure T-complexity. The algorithm uses approximately one third of the memory of its predecessor while reducing the running time b
Publikováno v:
Cluster Computing. 16:989-1003
The wide-scale adoption of modern smart phones and other multi-radio mobile devices, has begun to provide pragmatic deployment environments for non-cellular mobile ad hoc network (MANET) services (i.e., for disaster recovery scenarios, peered mobile
Publikováno v:
IEEE Transactions on Information Forensics and Security. 7:1278-1287
Wireless secret key generation (WKG) methods based on communications channel characterizations have gained significant interest as a mechanism for providing secure point-to-point communications. Ultra-wide band (UWB) WKG solutions provide an advantag
Publikováno v:
PACRIM
A number of open cyber-security challenges are arising due to the rapidly evolving scale, complexity, and heterogeneity of modern IT systems and networks. The ease with which copious volumes of operational data can be collected from such systems has
Publikováno v:
AINA
Sentiment analysis of the text data available on the web either in the form of blogs or at social media sites such as Twitter, Facebook, and LinkedIn, offers information through which to assess people's perspective of products and services that are o