Sciweavers

4609 search results - page 872 / 922
» Automatic Generation of Sigma-Protocols
Sort
View
EUROSYS
2010
ACM
15 years 9 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
EUROSYS
2007
ACM
15 years 9 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
EWSN
2010
Springer
15 years 9 months ago
Selective Reprogramming of Mobile Sensor Networks through Social Community Detection
Abstract. We target application domains where the behavior of animals or humans is monitored using wireless sensor network (WSN) devices. The code on these devices is updated frequ...
Bence Pásztor, Luca Mottola, Cecilia Mascol...
ICCAD
2008
IEEE
246views Hardware» more  ICCAD 2008»
15 years 8 months ago
MC-Sim: an efficient simulation tool for MPSoC designs
The ability to integrate diverse components such as processor cores, memories, custom hardware blocks and complex network-on-chip (NoC) communication frameworks onto a single chip...
Jason Cong, Karthik Gururaj, Guoling Han, Adam Kap...
ICCAD
2005
IEEE
127views Hardware» more  ICCAD 2005»
15 years 8 months ago
Hardware synthesis from guarded atomic actions with performance specifications
We present a new hardware synthesis methodology for guarded atomic actions (or rules), which satisfies performance-related scheduling specifications provided by the designer. The ...
Daniel L. Rosenband