Sciweavers

343 search results - page 2 / 69
» Design methodology for IRA codes
Sort
View
IWIA
2005
IEEE
13 years 11 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
TSP
2008
111views more  TSP 2008»
13 years 5 months ago
Coding Schemes for User Cooperation in Low-Power Regimes
We consider the design of cooperation coding schemes for a two-user multi-access channel (MAC). In particular, we consider two block Markov coding schemes, namely, the multiplexed...
Guosen Yue, Xiaodong Wang, Zigui Yang, Anders H&os...
DAC
2008
ACM
13 years 7 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
ICASSP
2011
IEEE
12 years 9 months ago
A methodology based on Transportation problem modeling for designing parallel interleaver architectures
For high-data-rate applications, turbo-like iterative decoders are implemented with parallel hardware architecture. However, to achieve high throughput, concurrent accesses to each...
Awais Sani, Philippe Coussy, Cyrille Chavet, Eric ...
ICCAD
2006
IEEE
141views Hardware» more  ICCAD 2006»
14 years 2 months ago
A code refinement methodology for performance-improved synthesis from C
Although many recent advances have been made in hardware synthesis techniques from software programming languages such as C, the performance of synthesized hardware commonly suffe...
Greg Stitt, Frank Vahid, Walid A. Najjar