Sciweavers

767 search results - page 153 / 154
» Model-Based Development of Distributed Embedded Real-Time Sy...
Sort
View
CCS
2005
ACM
13 years 11 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ACSAC
2010
IEEE
13 years 3 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
DAC
2004
ACM
14 years 6 months ago
A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits
Circuits using nano-meter technologies are becoming increasingly vulnerable to signal interference from multiple noise sources as well as radiation-induced soft errors. One way to...
Chong Zhao, Xiaoliang Bai, Sujit Dey
SEMWEB
2007
Springer
13 years 12 months ago
Using the AgreementMaker to Align Ontologies for the OAEI Campaign 2007
In this paper, we present the AgreementMaker, an ontology alignment tool that incorporates the Descendants Similarity Inheritance (DSI) method. This method uses the structure of th...
William Sunna, Isabel F. Cruz
DAC
2003
ACM
13 years 11 months ago
Instruction set compiled simulation: a technique for fast and flexible instruction set simulation
Instruction set simulators are critical tools for the exploration and validation of new programmable architectures. Due to increasing complexity of the architectures and timeto-ma...
Mehrdad Reshadi, Prabhat Mishra, Nikil D. Dutt