Sciweavers

73 search results - page 14 / 15
» Unified Property Specification for Hardware Software Co-Veri...
Sort
View
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 8 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
15 years 6 months ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann
111
Voted
EDBT
2008
ACM
188views Database» more  EDBT 2008»
16 years 1 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...
DAC
1999
ACM
16 years 2 months ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...
COMPSAC
2002
IEEE
15 years 6 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...