Sciweavers

8503 search results - page 318 / 1701
» Secure Software Architectures
Sort
View
137
Voted
ASPDAC
2005
ACM
89views Hardware» more  ASPDAC 2005»
15 years 7 months ago
System-level design space exploration for security processor prototyping in analytical approaches
— The customization of architectures in designing the security processor-based systems typically involves timeconsuming simulation and sophisticated analysis in the exploration o...
Yung-Chia Lin, Chung-Wen Huang, Jenq Kuen Lee
148
Voted
ICSE
2003
IEEE-ACM
15 years 10 months ago
Requirements, Architectures and Risks
There is wide agreement that architecture plays a prominent role in large, complex software systems. Selection of an appropriate architecture – one that matches the system requi...
James D. Kiper, Martin S. Feather
115
Voted
MICRO
1995
IEEE
72views Hardware» more  MICRO 1995»
15 years 8 months ago
Dynamic rescheduling: a technique for object code compatibility in VLIW architectures
Lack of object code compatibility in VLIW architectures is a severe limit to their adoption as a generalpurpose computing paradigm. Previous approaches include hardware and softwa...
Thomas M. Conte, Sumedh W. Sathaye
COMPSAC
1997
IEEE
15 years 9 months ago
Model-integrated system development: models, architecture, and process
Many large software systems are tightly integrated with their physical environments and must be adapted when their environment changes. Typically, software development methodologi...
Gabor Karsai, Amit Misra, Janos Sztipanovits, &Aac...
134
Voted
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 11 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila