Sciweavers

991 search results - page 145 / 199
» Foundations for Designing Secure Architectures
Sort
View
DAC
2003
ACM
15 years 11 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
MOBIDE
2009
ACM
15 years 4 months ago
Toward context and preference-aware location-based services
The explosive growth of location-detection devices, wireless communications, and mobile databases has resulted in the realization of location-based services as commercial products...
Mohamed F. Mokbel, Justin J. Levandoski
IEEEPACT
2006
IEEE
15 years 4 months ago
Complexity-based program phase analysis and classification
Modeling and analysis of program behavior are at the foundation of computer system design and optimization. As computer systems become more adaptive, their efficiency increasingly...
Chang-Burm Cho, Tao Li
IDTRUST
2009
ACM
15 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WISEC
2009
ACM
15 years 4 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru