Sciweavers

533 search results - page 66 / 107
» Control flow based obfuscation
Sort
View
91
Voted
ISQED
2007
IEEE
109views Hardware» more  ISQED 2007»
15 years 8 months ago
Virtual Channels Planning for Networks-on-Chip
The virtual channel flow control (VCFC) provides an efficient implementation for on-chip networks. However, allocating the virtual channels (VCs) uniformly results in a waste of a...
Ting-Chun Huang, Ümit Y. Ogras, Radu Marcules...
EDCC
1994
Springer
15 years 6 months ago
Hierarchical Checking of Multiprocessors Using Watchdog Processors
A new control flow checking scheme, based on assigned-signature checking by a watchdog processor, is presented. This scheme is suitable for a multitasking, multiprocessor environme...
István Majzik, András Pataricza, Mar...
ICCAD
1992
IEEE
93views Hardware» more  ICCAD 1992»
15 years 6 months ago
Timing analysis in high-level synthesis
This paper presents a comprehensive timing model for behavioral-level specifications and algorithms for timing analysis in high-level synthesis. It is based on a timing network wh...
Andreas Kuehlmann, Reinaldo A. Bergamaschi
128
Voted
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
15 years 6 months ago
Evolving distributed agents for managing air traffic
Air traffic management offers an intriguing real world challenge to designing large scale distributed systems using evolutionary computation. The ability to evolve effective air t...
Adrian K. Agogino, Kagan Tumer
152
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 6 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...