Sciweavers

904 search results - page 95 / 181
» Component Programming - a Fresh Look at Software Components
Sort
View
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 2 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
POPL
2004
ACM
14 years 9 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds
IJISEC
2006
106views more  IJISEC 2006»
13 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
HPDC
1993
IEEE
14 years 1 months ago
Supporting Heterogeneity and Distribution in the Numerical Propulsion System
The Numerical Propulsion System Simulation (NPSS) project has been initiated by NASA to explore the use of computer simulation in the development of new aircraft propulsion techno...
Patrick T. Homer, Richard D. Schlichting
GPCE
2007
Springer
14 years 3 months ago
42: programmable models of computation for a component-based approach to heterogeneous embedded systems
Every notion of a component for the development of embedded systems has to take heterogeneity into account: components may be hardware or software or OS, synchronous or asynchrono...
Florence Maraninchi, Tayeb Bouhadiba