Sciweavers

1821 search results - page 264 / 365
» Security-Aware Program Transformations
Sort
View
RTCSA
2006
IEEE
15 years 6 months ago
An RTOS API Translator for Model-Driven Embedded Software Development
In this paper, we present a model-driven approach to RTOS-based embedded software development and an automated tool that can produce RTOS-specific code. Our contributions are two ...
Ji Chan Maeng, Jong-Hyuk Kim, Minsoo Ryu
ASPDAC
2006
ACM
119views Hardware» more  ASPDAC 2006»
15 years 6 months ago
Using speculative computation and parallelizing techniques to improve scheduling of control based designs
Recent research results have seen the application of parallelizing techniques to high-level synthesis. In particular, the effect of speculative code transformations on mixed contr...
Roberto Cordone, Fabrizio Ferrandi, Marco D. Santa...
95
Voted
LICS
2005
IEEE
15 years 6 months ago
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics
Three-valued models, in which properties of a system are either true, false or unknown, have recently been advocated as a better representation for reactive program abstractions g...
Patrice Godefroid, Michael Huth
134
Voted
VEE
2005
ACM
203views Virtualization» more  VEE 2005»
15 years 6 months ago
Inlining java native calls at runtime
We introduce a strategy for inlining native functions into JavaTM applications using a JIT compiler. We perform further optimizations to transform inlined callbacks into semantica...
Levon Stepanian, Angela Demke Brown, Allan Kielstr...
84
Voted
ICALP
2005
Springer
15 years 6 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin