Sciweavers

3643 search results - page 241 / 729
» System Architecture for Software Peripherals
Sort
View
ECSA
2010
Springer
15 years 4 months ago
Linking Design Decisions to Design Models in Model-Based Software Development
Abstract. Numerous design decisions are made in model-based software development which often are not documented explicitly. Hence, the design knowledge is 'in the designers mi...
Patrick Könemann, Olaf Zimmermann
IJNSEC
2008
135views more  IJNSEC 2008»
15 years 4 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
POPL
2007
ACM
16 years 5 months ago
A concurrent constraint handling rules implementation in Haskell with software transactional memory
Constraint Handling Rules (CHR) is a concurrent committedchoice constraint logic programming language to describe transformations (rewritings) among multi-sets of constraints (ato...
Edmund S. L. Lam, Martin Sulzmann
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 10 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
FLAIRS
2001
15 years 6 months ago
A Background Layer of Health Monitoring and Error Handling for ObjectAgent
ObjectAgent is an agent-based, message-passing software architecture that utilizes natural language processing to provide autonomous control to complex systems. As a form of distr...
Joseph B. Mueller, Derek M. Surka, Joy J. Lin