Sciweavers

1821 search results - page 264 / 365
» Security-Aware Program Transformations
Sort
View
RTCSA
2006
IEEE
15 years 11 months ago
An RTOS API Translator for Model-Driven Embedded Software Development
In this paper, we present a model-driven approach to RTOS-based embedded software development and an automated tool that can produce RTOS-specific code. Our contributions are two ...
Ji Chan Maeng, Jong-Hyuk Kim, Minsoo Ryu
124
Voted
ASPDAC
2006
ACM
119views Hardware» more  ASPDAC 2006»
15 years 11 months ago
Using speculative computation and parallelizing techniques to improve scheduling of control based designs
Recent research results have seen the application of parallelizing techniques to high-level synthesis. In particular, the effect of speculative code transformations on mixed contr...
Roberto Cordone, Fabrizio Ferrandi, Marco D. Santa...
LICS
2005
IEEE
15 years 10 months ago
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics
Three-valued models, in which properties of a system are either true, false or unknown, have recently been advocated as a better representation for reactive program abstractions g...
Patrice Godefroid, Michael Huth
VEE
2005
ACM
203views Virtualization» more  VEE 2005»
15 years 10 months ago
Inlining java native calls at runtime
We introduce a strategy for inlining native functions into JavaTM applications using a JIT compiler. We perform further optimizations to transform inlined callbacks into semantica...
Levon Stepanian, Angela Demke Brown, Allan Kielstr...
ICALP
2005
Springer
15 years 10 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin