Sciweavers

805 search results - page 46 / 161
» Description and Simulation of Hardware Software Systems with...
Sort
View
USS
2004
15 years 3 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
ISCA
1994
IEEE
123views Hardware» more  ISCA 1994»
15 years 6 months ago
Software-Extended Coherent Shared Memory: Performance and Cost
This paper evaluates the tradeoffs involved in the design of the software-extended memory system of Alewife, a multiprocessor architecturethat implements coherentsharedmemorythrou...
David Chaiken, Anant Agarwal
ICECCS
2008
IEEE
3385views Hardware» more  ICECCS 2008»
15 years 8 months ago
Contract-Based Approach to Analyze Software Components
Component-based software development focuses on building large software systems by integrating existing software components to reduce cost, risk and time. However, behavioural and...
Abdelhafid Zitouni, Lionel Seinturier, Mahmoud Bou...
FCCM
1998
IEEE
148views VLSI» more  FCCM 1998»
15 years 6 months ago
JHDL - An HDL for Reconfigurable Systems
JHDL is a design tool for reconfigurable systems that allows designers to express circuit organizations that dynamically change over time in a natural way, using only standard pro...
Peter Bellows, Brad L. Hutchings
DATE
2009
IEEE
172views Hardware» more  DATE 2009»
15 years 8 months ago
On bounding response times under software transactional memory in distributed multiprocessor real-time systems
We consider multiprocessor distributed real-time systems where concurrency control is managed using software transactional memory (or STM). For such a system, we propose an algori...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...