Sciweavers

2572 search results - page 462 / 515
» codes 2008
Sort
View
DAC
2008
ACM
15 years 2 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
82
Voted
DAS
2008
Springer
15 years 2 months ago
Document Image Retrieval to Support Reading Mokkans
This paper presents a design and an implementation of document image retrieval to support reading mokkans. A mokkan is a wooden tablet with text written by a brush in India ink. D...
Akihito Kitadai, Jun Takakura, Masatoshi Ishikawa,...
107
Voted
DSN
2008
IEEE
15 years 2 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DSVIS
2008
Springer
15 years 2 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
ECMDAFA
2008
Springer
100views Hardware» more  ECMDAFA 2008»
15 years 2 months ago
From UML Activities to TAAL - Towards Behaviour-Preserving Model Transformations
Model transformations support a model-driven design by providing an c translation of abstract models into more concrete ones, and eventually program code. Crucial to a successful a...
Gregor Engels, Anneke Kleppe, Arend Rensink, Maria...