Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Circuit faults
biblio
Multiple-fault diagnosis of analog circuit with fault tolerance
Submitted by grigby1 on Thu, 02/15/2018 - 11:47am
Linear programming
Tolerance
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
parameter estimation
nominal circuit node voltages
multiple-fault diagnosis
Multiple-fault
multiple fault diagnosis
Metrics
Mathematical model
analog circuit
Human Factors
human factor
Human behavior
fault tolerance
fault rough set generation
fault diagnosis
fault detection
fault characteristic equation
element isolation
Circuit faults
analogue circuits
Analog circuits
biblio
Multiple fault diagnosis in analog circuits using the indirect compensation theorem
Submitted by grigby1 on Thu, 02/15/2018 - 11:46am
public domain software
linear subcircuits
Metrics
multiple fault diagnosis
multiple faults diagnosis techniques
multiport networks
nullor
parameter estimation
Ports (Computers)
pubcrawl
linear network analysis
resilience
Resiliency
symbolic analysis
symbolic analysis process
symbolic circuit analysis
Topology
two-port network
Voltage measurement
equivalent circuits
Analog circuits
analogue circuits
circuit analysis computing
circuit determinant expressions
Circuit faults
circuit simulation
Cirsym freeware computer program
Current measurement
analog circuit diagnosis
fault diagnosis
generalized parameter extraction method
Human behavior
human factor
Human Factors
indirect compensation theorem
linear analog circuits
linear models
biblio
Accurate Diagnosis of Interconnect Open Defects Based on the Robust Enhanced Aggressor Victim Model
Submitted by grigby1 on Wed, 12/20/2017 - 8:51pm
Logic gates
unknown values
test generation
SMT
Robustness
robust enhanced aggressor victim model
Resiliency
pubcrawl
privacy
physical failure analysis
oscillating behaviors
open faults
nanotechnology
nanoscale technologies
Metrics
ATPG
Interconnect opens
interconnect open defects
integrated circuit modelling
Integrated circuit modeling
Integrated circuit interconnections
failure analysis
electrical parameters
diagnostic classification algorithm
diagnose
Couplings
composability
Circuit faults
Capacitance
automatic test pattern generation
biblio
Apply a wireless line sensor system to enhance distribution protection schemes
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
supervisory control and data acquisition system
power distribution faults
power distribution protection
power distribution reliability
pubcrawl
Relays
Resiliency
SCADA systems
sensor security
Metrics
upstream protection devices
Wireless communication
Wireless communications
wireless line sensor system
wireless line sensors
wireless protection sensor system
wireless sensor networks
fault location
Communication system security
composability
data acquisition
distribution protection schemes
distribution system protection
Fault currents
fault diagnosis
fault information
Circuit faults
fault status
faulted circuit indicators
faulted line sections
Fuses
Human behavior
Human Factors
local visual indication
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Detection, diagnosis, and repair of faults in memristor-based memories
Submitted by BrandonB on Wed, 05/06/2015 - 2:33pm
Memristor
testing
test time
Sneak-paths
sneak-path free crossbar
Resistance
random-access storage
post-silicon recovery
nanoscale fabrication
multiple memory cells testing
memristors
memristor-based memories
memristor failures
Circuit faults
Memory
March testing
maintenance engineering
integrated circuits
hybrid diagnosis scheme
high defect densities
future memory architectures
faulty cell repairs
fault diagnosis
fault detection
crossbar memories
biblio
An efficient diagnosis method to deal with multiple fault-pairs simultaneously using a single circuit model
Submitted by BrandonB on Wed, 05/06/2015 - 2:32pm
Integrated circuit modeling
stuck-at faults
single circuit model
nonequivalent-fault pairs
Multiplexing
multi-pair diagnosis
Logic gates
IWLS'05 benchmark circuit
ISCAS'89 benchmark circuit
automatic test pattern generation
fault pairs diagnosis
Fault injection
fault diagnosis
diagnosis-aware ATPG method
diagnosis pattern generation
Circuit faults
Central Processing Unit
biblio
Diagnosis of multiple faults with highly compacted test responses
Submitted by BrandonB on Wed, 05/06/2015 - 2:31pm
field return analysis
yield ramp-up
Response Compaction
process learning
probability
Multiple Faults
multiple fault probability
multiple fault diagnosis
MISR compactor
Mathematical model
logic diagnosis
linear properties
integrated circuit yield
integrated circuit testing
Accuracy
faulty signatures
fault diagnosis
Equations
embedded test
Diagnosis
defects cluster
compressed test responses
Compaction
compacted test responses
Circuit faults
built-in self-test
built-in self test
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 11:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 11:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
« first
‹ previous
1
2
3
4
5
6
next ›
last »