Sciweavers

261 search results - page 14 / 53
» Applying Slicing Technique to Software Architectures
Sort
View
SAC
2006
ACM
15 years 5 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
SC
2005
ACM
15 years 5 months ago
Fault Tolerance Techniques for the Merrimac Streaming Supercomputer
As device scales shrink, higher transistor counts are available while soft-errors, even in logic, become a major concern. A new class of architectures, such as Merrimac and the IB...
Mattan Erez, Nuwan Jayasena, Timothy J. Knight, Wi...
DAC
1995
ACM
15 years 3 months ago
Rephasing: A Transformation Technique for the Manipulation of Timing Constraints
- We introduce a transformation, named rephasing, that manipulates the timing parameters in control-dataflow graphs. Traditionally high-level synthesis systems for DSP have either ...
Miodrag Potkonjak, Mani B. Srivastava
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
15 years 5 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
CSMR
2008
IEEE
15 years 6 months ago
Towards Recovering Architectural Concepts Using Latent Semantic Indexing
Software engineers think about an existing software system in terms of high-level models. The high-level models are translated to source code and the concepts represented in these...
Pieter van der Spek, Steven Klusener, Piërre ...