Sciweavers

3056 search results - page 220 / 612
» Open Implementation Analysis and Design
Sort
View
126
Voted
ICSE
2009
IEEE-ACM
16 years 5 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
149
Voted
CARDIS
2004
Springer
216views Hardware» more  CARDIS 2004»
15 years 10 months ago
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
Mark G. Karpovsky, Konrad J. Kulikowski, Alexander...
WSC
2007
15 years 6 months ago
Sensitivity analysis on causal events of WIP bubbles by a log-driven simulator
Fluctuations of work-in-progress (WIP) levels cause variability of cycle time and often lead to productivity losses in semiconductor wafer fabrication plants. To identify sources ...
Ryo Hirade, Rudy Raymond, Hiroyuki Okano
155
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 4 months ago
Towards Performance Measurement And Metrics Based Analysis of PLA Applications
This article is about a measurement analysis based approach to help software practitioners in managing the additional level complexities and variabilities in software product line...
Zeeshan Ahmed
ICCAD
2010
IEEE
119views Hardware» more  ICCAD 2010»
15 years 2 months ago
Symbolic system level reliability analysis
Abstract--More and more embedded systems provide a multitude of services, implemented by a large number of networked hardware components. In early design phases, dimensioning such ...
Michael Glaß, Martin Lukasiewycz, Felix Reim...