Sciweavers

1984 search results - page 236 / 397
» Binary Component Adaptation
Sort
View
CASES
2007
ACM
15 years 8 months ago
Lightweight barrier-based parallelization support for non-cache-coherent MPSoC platforms
Many MPSoC applications are loop-intensive and amenable to automatic parallelization with suitable compiler support. One of the key components of any compiler-parallelized code is...
Andrea Marongiu, Luca Benini, Mahmut T. Kandemir
ICESS
2007
Springer
15 years 8 months ago
An Analyzer of the User Event for Interactive DMB
Abstract. The interactive digital multimedia broadcasting stands for a convergence application between digital multimedia broadcasting service and wireless internet service. It dev...
Hlaing Su Khin, Sangwook Kim
ACSAC
2004
IEEE
15 years 8 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
CAV
2006
Springer
132views Hardware» more  CAV 2006»
15 years 8 months ago
Symmetry Reduction for Probabilistic Model Checking
We present an approach for applying symmetry reduction techniques to probabilistic model checking, a formal verification method for the quantitative analysis of systems with stocha...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 7 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...