Sciweavers

266 search results - page 40 / 54
» Combining Software and Hardware Verification Techniques
Sort
View
CODES
2007
IEEE
15 years 8 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
TEI
2012
ACM
258views Hardware» more  TEI 2012»
13 years 9 months ago
The HapticTouch toolkit: enabling exploration of haptic interactions
In the real world, touch based interaction relies on haptic feedback (e.g., grasping objects, feeling textures). Unfortunately, such feedback is absent in current tabletop systems...
David Ledo, Miguel A. Nacenta, Nicolai Marquardt, ...
104
Voted
ASIAMS
2008
IEEE
15 years 8 months ago
Computational Intelligence and Geo-Informatics in Viticulture
Geo-informatics is a field of science that combines geodetic and spatial information processing methods with computing hardware and software technologies. Research being conducted...
Subana Shanmuganathan, Philip Sallis, Leopoldo Pav...
CCS
2007
ACM
15 years 8 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
ASPLOS
1991
ACM
15 years 5 months ago
LimitLESS Directories: A Scalable Cache Coherence Scheme
Caches enhance the performance of multiprocessors by reducing network trac and average memory access latency. However, cache-based systems must address the problem of cache coher...
David Chaiken, John Kubiatowicz, Anant Agarwal