The ultrasonic vibration energy for Cu-Cu bonding by flip-chip bonding technology was evaluated in ambient air. Transmissibility of ultrasonic vibration is assumed to be different in bump structure with height or low ...
详细信息
ISBN:
(纸本)9781479933679
The ultrasonic vibration energy for Cu-Cu bonding by flip-chip bonding technology was evaluated in ambient air. Transmissibility of ultrasonic vibration is assumed to be different in bump structure with height or low stiffness. Therefore, we investigated the bonding strength of Cu bump with the different aspect ratio (bump height: 5 μm, 20 μm, and 40 μm). As a result, the Cu bumps with 20 μm height were properly bonded with sufficient bonding strength, compared with the others. In addition, there were no significant voids at Cu-Cu interface of well-bonded Cu bump.
Cross-Site Scripting (XSS) attacks are one of the most prevalent security threats all over the world. Although various defense methods have been proposed, most of them lack usability. Motivated by this reason, we pres...
详细信息
Android uses permissions for application security management. Android also allows inter-application communication (IAC) which enables cooperation between different applications to perform complex tasks and is a major ...
详细信息
In many industrial systems, the multivariable system which has mutual interference has to be dealt with. Therefore, decoupling the multivariable system is an important issue to construct a control system. Although var...
详细信息
U-Home is a home-service through an interaction between human and object. Smart-home-middle-wear provides its users with services needed through interactions between users and home equipment. In this study, users'...
详细信息
With the wide spread uses of the Internet, the number of Internet attacks keeps increasing, and malware is the main cause of most Internet attacks. Malware is used by attackers to infect normal users' computers an...
详细信息
ISBN:
(纸本)9781450314923
With the wide spread uses of the Internet, the number of Internet attacks keeps increasing, and malware is the main cause of most Internet attacks. Malware is used by attackers to infect normal users' computers and to acquire private information as well as to attack other machines. The number of new malware and variants of malware is increasing every year because the automated tools allow attackers to generate the new malware or their variants easily. Therefore, performance improvement of the malware analysis is critical to prevent malware from spreading rapidly and to mitigate damages to users. In this paper, we proposed a new malware classification method by analyzing similarities of malware. Our method analyzes a small part of malware to reduce analysis overheads, and experimental results showed that our approach can effectively classify malware families. Copyright 2012 ACM.
We present a method for identification of gene regulatory network topology using a time series of gene expression data. The underlying assumption in our method is that the functions that describe regulatory relations ...
详细信息
Sulley, one of fuzzing tools can describe Software Under Test (SUT) more easily than other tools and provides with the libraries which can create the variety of test cases. But it has a weak point of difficulty to ver...
详细信息
Conventional optical coherence tomography (OCT) systems generally have a limited imaging range within a depth of only 1-2 mm and suffers from unwanted noise such as speckle, ghost or mirror noise. To overcome these li...
详细信息
In this paper, we develop a context recognition system that is based on multimodal biometric signals and applicable to smart driving system. The context recognition system includes a biometric analysis module that ana...
详细信息
暂无评论