Sciweavers

1222 search results - page 67 / 245
» Verifying a File System Implementation
Sort
View
93
Voted
ICECCS
2000
IEEE
87views Hardware» more  ICECCS 2000»
15 years 6 months ago
Automated Result Verification with AWK
The goal of result-verificationis toprove that one execution run of a program satisjes its speciJcation. Compared with iniplenzentation-verification,result-verification has a larg...
Balkhis Abu Bakar, Tomasz Janowski
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
15 years 11 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
TPDS
2010
116views more  TPDS 2010»
15 years 25 days ago
FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale
—It has been widely acknowledged that online file hosting systems within the “cloud” of the Internet have provided valuable services to end users who wish to share files of a...
Fangming Liu, Ye Sun, Bo Li, Baochun Li, Xinyan Zh...
DATE
2005
IEEE
141views Hardware» more  DATE 2005»
15 years 4 months ago
Multimedia Applications of Multiprocessor Systems-on-Chips
This paper surveys the characteristics of multimedia systems. Multimedia applications today are dominated by compression and decompression, but multimedia devices must also implem...
Wayne Wolf
POPL
2008
ACM
16 years 2 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk