Sciweavers

261 search results - page 21 / 53
» Applying Slicing Technique to Software Architectures
Sort
View
DAC
1999
ACM
16 years 24 days ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...
CBSE
2006
Springer
15 years 3 months ago
A Process for Resolving Performance Trade-Offs in Component-Based Architectures
Designing architectures requires the balancing of multiple system quality objectives. In this paper, we present techniques that support the exploration of the quality properties of...
Egor Bondarev, Michel R. V. Chaudron, Peter H. N. ...
ECSA
2008
Springer
15 years 1 months ago
Non-synchronous Communications in Process Algebraic Architectural Description Languages
Abstract. Architectural description languages are a useful tool for modmplex software systems at a high level of abstraction and, if based on formal methods, for enabling the early...
Marco Bernardo, Edoardo Bontà
ICCS
2007
Springer
15 years 6 months ago
Middleware in Modern High Performance Computing System Architectures
A recent trend in modern high performance computing (HPC) system architectures employs “lean” compute nodes running a lightweight operating system (OS). Certain parts of the OS...
Christian Engelmann, Hong Ong, Stephen L. Scott
ACSAC
2003
IEEE
15 years 3 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...