Sciweavers

2236 search results - page 305 / 448
» Secure Software Design in Practice
Sort
View
JUCS
2010
83views more  JUCS 2010»
14 years 8 months ago
Developing Augmented Objects: A Process Perspective
: There are many examples of augmented objects in the literature. Augmented objects should provide intelligence to the ambient where they are located and also they must require a l...
Luis A. Guerrero, Hector Horta, Sergio F. Ochoa
KBSE
2010
IEEE
14 years 8 months ago
How did you specify your test suite
Although testing is central to debugging and software certification, there is no adequate language to specify test suites over source code. Such a language should be simple and c...
Andreas Holzer, Christian Schallhart, Michael Taut...
OOPSLA
2005
Springer
15 years 3 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
15 years 3 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
FCCM
2006
IEEE
144views VLSI» more  FCCM 2006»
15 years 4 months ago
Combining Instruction Coding and Scheduling to Optimize Energy in System-on-FPGA
In this paper, we investigate a combination of two techniques — instruction coding and instruction re-ordering — for optimizing energy in embedded processor control. We presen...
Robert G. Dimond, Oskar Mencer, Wayne Luk