Sciweavers

1774 search results - page 56 / 355
» Modeling and implementing software architecture with acme an...
Sort
View
ASPLOS
2006
ACM
15 years 4 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
SIGSOFT
2004
ACM
15 years 10 months ago
System architecture: the context for scenario-based model synthesis
Constructing rigorous models for analysing the behaviour of concurrent and distributed systems is a complex task. Our aim is to facilitate model construction. Scenarios provide si...
Jeff Kramer, Jeff Magee, Robert Chatley, Sebasti&a...
SAC
2006
ACM
15 years 3 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
DAC
2002
ACM
15 years 11 months ago
Model design using hierarchical web-based libraries
Design tools can be profitably associated with libraries of reusable modeling components that will make the description and also the validation of the models much easier. Furtherm...
Fabrice Bernardi, Jean François Santucci
CODES
2006
IEEE
15 years 4 months ago
Yield prediction for architecture exploration in nanometer technology nodes: : a model and case study for memory organizations
Process variability has a detrimental impact on the performance of memories and other system components, which can lead to parametric yield loss at the system level due to timing ...
Antonis Papanikolaou, T. Grabner, Miguel Miranda, ...