Sciweavers

419 search results - page 60 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ECMDAFA
2006
Springer
91views Hardware» more  ECMDAFA 2006»
13 years 11 months ago
Using a Model Merging Language for Reconciling Model Versions
A difficult challenge in the industrialisation of Model-Driven Development is managing different versions of models. Different versions may arise at any time during the development...
Klaus-D. Engel, Richard F. Paige, Dimitrios S. Kol...
DAC
2007
ACM
14 years 8 months ago
Automatic Verification of External Interrupt Behaviors for Microprocessor Design
Interrupt behaviors, especially the external ones, are difficult to verify in a microprocessor design project in that they involve both interacting hardware and software. This pap...
Fu-Ching Yang, Wen-Kai Huang, Ing-Jer Huang
CASES
2004
ACM
14 years 29 days ago
Balancing design options with Sherpa
Application specific processors offer the potential of rapidly designed logic specifically constructed to meet the performance and area demands of the task at hand. Recently, t...
Timothy Sherwood, Mark Oskin, Brad Calder
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 1 months ago
Hardware-Assisted Scanning for Signature Patterns in Image File Fragments
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is an important activity in the field of digital f...
Yoginder S. Dandass
HPCA
2007
IEEE
14 years 7 months ago
MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging
Memory bugs are a broad class of bugs that is becoming increasingly common with increasing software complexity, and many of these bugs are also security vulnerabilities. Unfortuna...
Guru Venkataramani, Brandyn Roemer, Yan Solihin, M...