Sciweavers

3516 search results - page 453 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 11 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
EUROSYS
2008
ACM
16 years 1 months ago
DepSpace: a byzantine fault-tolerant coordination service
The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization pow...
Alysson Neves Bessani, Eduardo Adílio Pelin...
ICCAD
2007
IEEE
113views Hardware» more  ICCAD 2007»
15 years 11 months ago
The FAST methodology for high-speed SoC/computer simulation
— This paper describes the FAST methodology that enables a single FPGA to accelerate the performance of cycle-accurate computer system simulators modeling modern, realistic SoCs,...
Derek Chiou, Dam Sunwoo, Joonsoo Kim, Nikhil A. Pa...
DAWAK
2008
Springer
15 years 6 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
ESORICS
2008
Springer
15 years 6 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...