Sciweavers

65 search results - page 4 / 13
» Modeling Safe Operating Area in Hardware Description Languag...
Sort
View
155
Voted
HOST
2011
IEEE
14 years 24 days ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
102
Voted
ECMDAFA
2006
Springer
107views Hardware» more  ECMDAFA 2006»
15 years 4 months ago
Mutation Analysis Testing for Model Transformations
In MDE, model transformations should be efficiently tested so that it may be used and reused safely. Mutation analysis is an efficient technique to evaluate the quality of test dat...
Jean-Marie Mottu, Benoit Baudry, Yves Le Traon
107
Voted
COMPSEC
2008
116views more  COMPSEC 2008»
15 years 1 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
101
Voted
ICALP
1999
Springer
15 years 5 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
174
Voted
CATA
2010
15 years 1 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad