Sciweavers

2236 search results - page 237 / 448
» Secure Software Design in Practice
Sort
View
TASE
2008
IEEE
15 years 3 months ago
Randomized Optimal Design of Parallel Manipulators
This work intends to deal with the optimal kinematic synthesis problem of parallel manipulators under a unified framework. Observing that regular (e.g., hyper-rectangular) workspac...
Yunjiang Lou, Guanfeng Liu, Zexiang Li
119
Voted
OOPSLA
2004
Springer
15 years 8 months ago
An aspect-oriented generative approach
Generative programming and aspect-oriented software development have been proposed over the last years aiming at increasing maintainability and reusability of software systems. Wh...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...
135
Voted
NSDI
2008
15 years 5 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
211
Voted
TASE
2011
IEEE
14 years 10 months ago
KnitSketch: A Sketch Pad for Conceptual Design of 2D Garment Patterns
—In this paper, we present a new sketch-based system — KnitSketch, to improve the efficiency of process planning for knitting garments at an early design stage. The KnitSketch...
Cui-Xia Ma, Yong-Jin Liu, Hai-Yan Yang, Dong-Xing ...
CCS
2008
ACM
15 years 5 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar