Sciweavers

4305 search results - page 101 / 861
» Analysing Protocol Implementations
Sort
View
IFIP
2009
Springer
13 years 6 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
PLDI
2010
ACM
14 years 2 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
GRID
2005
Springer
14 years 2 months ago
Toward seamless grid data access: design and implementation of GridFTP on .NET
— To date, only Linux-/UNIX-based hosts have been participants in the Grid vision for seamless data access, because the necessary Grid data access protocols have not been impleme...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
MIDDLEWARE
2004
Springer
14 years 2 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang
DFT
2007
IEEE
123views VLSI» more  DFT 2007»
14 years 3 months ago
Checker Design for On-line Testing of Xilinx FPGA Communication Protocols
In the paper, a methodology of developing checkers for communication protocol testing is presented. It was used to develop checker to test IP cores communication protocol implemen...
Martin Straka, Jiri Tobola, Zdenek Kotásek