Sciweavers

8503 search results - page 264 / 1701
» Secure Software Architectures
Sort
View
ICSE
2003
IEEE-ACM
16 years 4 months ago
Stemming Architectural Erosion by Coupling Architectural Discovery and Recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Alexander Egyed, Nenad Medvidovic, Paul Grünb...
128
Voted
IWSEC
2009
Springer
15 years 11 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
SIGUCCS
2004
ACM
15 years 10 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
DSD
2006
IEEE
135views Hardware» more  DSD 2006»
15 years 8 months ago
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography
Until now, most cryptography implementations on parallel architectures have focused on adapting the software to SIMD architectures initially meant for media applications. In this ...
Jacques J. A. Fournier, Simon W. Moore
DAC
1999
ACM
16 years 5 months ago
Description and Simulation of Hardware/Software Systems with Java
Tommy Kuhn, Wolfgang Rosenstiel, Udo Kebschull