Sciweavers

2429 search results - page 316 / 486
» Using Aspects to Design a Secure System
Sort
View
94
Voted
MICRO
2003
IEEE
135views Hardware» more  MICRO 2003»
15 years 3 months ago
Generational Cache Management of Code Traces in Dynamic Optimization Systems
A dynamic optimizer is a runtime software system that groups a program’s instruction sequences into traces, optimizes those traces, stores the optimized traces in a softwarebase...
Kim M. Hazelwood, Michael D. Smith
CADE
2004
Springer
15 years 10 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl
99
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
DATE
2009
IEEE
101views Hardware» more  DATE 2009»
15 years 5 months ago
A monitor interconnect and support subsystem for multicore processors
Abstract— In many current SoCs, the architectural interface to onchip monitors is ad hoc and inefficient. In this paper, a new architectural approach which advocates the use of a...
Sailaja Madduri, Ramakrishna Vadlamani, Wayne Burl...
58
Voted
FM
2005
Springer
89views Formal Methods» more  FM 2005»
15 years 3 months ago
Control Law Diagrams in Circus
Abstract. Control diagrams are routinely used by engineers in the design of control systems. Yet, currently the formal verification of programs that implement the diagrams is a ch...
Ana Cavalcanti, Phil Clayton, Colin O'Halloran