Sciweavers

2147 search results - page 113 / 430
» Teleological Software Adaptation
Sort
View
IWSEC
2009
Springer
15 years 10 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
131
Voted
WIMOB
2007
IEEE
15 years 10 months ago
Software Solutions for Converting a MIMO-OFDM Channel into Multiple SISO-OFDM Channels
We present a software approach for MIMO-OFDM wireless communication technology. We first show that complex matrix operations like Singular-Value Decomposition (SVD), diagonalizat...
Mihai Sima, Murugappan Senthilvelan, Daniel Iancu,...
AOSD
2003
ACM
15 years 9 months ago
JAsCo: an aspect-oriented approach tailored for component based software development
In this paper we introduce a novel aspect oriented implementation language, called JAsCo. JAsCo is tailored for component based development and the Java Beans component model in p...
Davy Suvée, Wim Vanderperren, Viviane Jonck...
163
Voted
DSD
2006
IEEE
135views Hardware» more  DSD 2006»
15 years 7 months ago
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography
Until now, most cryptography implementations on parallel architectures have focused on adapting the software to SIMD architectures initially meant for media applications. In this ...
Jacques J. A. Fournier, Simon W. Moore
EWSA
2006
Springer
15 years 7 months ago
Modes for Software Architectures
Abstract. Modern systems are heterogeneous, geographically distributed and highly dynamic since the communication topology can vary and the components can, at any moment, connect t...
Dan Hirsch, Jeff Kramer, Jeff Magee, Sebasti&aacut...