Sciweavers

2513 search results - page 370 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
MIDDLEWARE
2005
Springer
15 years 3 months ago
Managing the follow-me semantics to build large-scale pervasive applications
In this paper, we present the concept of follow-me semantics of the large-scale pervasive application and discuss the features and services to its implementation based on the inte...
Iara Augustin, Adenauer C. Yamin, Cláudio F...
SIGSOFT
2003
ACM
15 years 11 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
ISSTA
2009
ACM
15 years 4 months ago
Precise pointer reasoning for dynamic test generation
Dynamic test generation consists of executing a program while gathering symbolic constraints on inputs from predicates encountered in branch statements, and of using a constraint ...
Bassem Elkarablieh, Patrice Godefroid, Michael Y. ...
CASES
2001
ACM
15 years 1 months ago
A system-on-a-chip lock cache with task preemption support
Intertask/interprocess synchronization overheads may be significant in a multiprocessor-shared memory System-on-a-Chip implementation. These overheads are observed in terms of loc...
Bilge Saglam Akgul, Jaehwan Lee, Vincent John Moon...
FPGA
2008
ACM
136views FPGA» more  FPGA 2008»
14 years 11 months ago
A complexity-effective architecture for accelerating full-system multiprocessor simulations using FPGAs
Functional full-system simulators are powerful and versatile research tools for accelerating architectural exploration and advanced software development. Their main shortcoming is...
Eric S. Chung, Eriko Nurvitadhi, James C. Hoe, Bab...