Sciweavers

1777 search results - page 155 / 356
» Programming Cryptographic Protocols
Sort
View
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 7 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
CN
1999
100views more  CN 1999»
15 years 1 months ago
Testing protocols modeled as FSMs with timing parameters
An optimization method is introduced for generating minimum-length test sequences taking into account timing constraints for FSM models of communication protocols. Due to active t...
M. Ümit Uyar, Mariusz A. Fecko, Adarshpal S. ...
CCS
2006
ACM
15 years 5 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
ICSE
2009
IEEE-ACM
15 years 8 months ago
Creating and evolving software by searching, selecting and synthesizing relevant source code
When programmers develop or maintain software, they instinctively sense that there are fragments of code that other developers implemented somewhere, and these code fragments coul...
Denys Poshyvanyk, Mark Grechanik
ASPLOS
2000
ACM
15 years 5 months ago
OceanStore: An Architecture for Global-Scale Persistent Storage
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted serv...
John Kubiatowicz, David Bindel, Yan Chen, Steven E...