Sciweavers

2236 search results - page 251 / 448
» Secure Software Design in Practice
Sort
View
116
Voted
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
15 years 8 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu
ICSE
2007
IEEE-ACM
16 years 3 months ago
POLUS: A POwerful Live Updating System
This paper presents POLUS, a software maintenance tool capable of iteratively evolving running software into newer versions. POLUS's primary goal is to increase the dependabi...
Haibo Chen, Jie Yu, Rong Chen, Binyu Zang, Pen-Chu...
EUROMICRO
2009
IEEE
15 years 10 months ago
Long-Term Planning of Development Efforts by Roadmapping
—Success in the software product business requires timely release of new products and upgrades with proper quality and the right features. For this, a systematic approach for man...
Jarno Vähäniitty, Casper Lassenius, Kris...
143
Voted
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
15 years 4 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
SIGCSE
1999
ACM
93views Education» more  SIGCSE 1999»
15 years 7 months ago
Patterns for decoupling data structures and algorithms
In order to build a data structure that is extensible and reusable, it is necessary to decouple the intrinsic and primitive behavior of the structure from the application specific...
Dung Zung Nguyen, Stephen B. Wong