We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications s...
Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, M...
Verification of image processing systems is mainly done on the basis of image sequence simulations. To achieve high simulation efficiency, our compiled code simulator MSIPC offers...
The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. According to Papazoglou et al., one challenge is to develop services...
Gregor Scheithauer, Konrad Voigt, Veli Bicer, Matt...
Abstract. To advance the comprehension of complex biological processes occurring in crop plants (e.g. for improvement of growth or yield) it is of high interest to reconstruct and ...
Stephan Weise, Christian Colmsee, Eva Grafahrend-B...
A growing number of networked applications is implemented on increasingly complex automotive platforms with several bus standards and gateways. Together, they challenge the automo...