Sciweavers

2945 search results - page 25 / 589
» Designing and Implementing Malicious Hardware
Sort
View
137
Voted
CSSE
2008
IEEE
15 years 10 months ago
Design and Implementation of the Virtual Machine Constructing on Register
: The technology of virtual machines is widely applied in many fields, such as code transplanting, cross-platform computing, and hardware simulation. The main purpose is to simulat...
Weibo Xie, Fu Ting
123
Voted
DATE
2008
IEEE
68views Hardware» more  DATE 2008»
15 years 10 months ago
Automatic Generation of Complex Properties for Hardware Designs
Property checking is a promising approach to prove the correctness of today’s complex designs. However, in practice this requires the formulation of formal properties which is a...
Frank Rogin, Thomas Klotz, Görschwin Fey, Rol...
ISSS
2000
IEEE
144views Hardware» more  ISSS 2000»
15 years 8 months ago
Efficient Hardware Controller Synthesis for Synchronous Dataflow Graph in System Level Design
This paper concerns automatic hardware synthesis from data flow graph (DFG) specification in system level design. In the presented design methodology, each node of a data flow gra...
Hyunuk Jung, Kangnyoung Lee, Soonhoi Ha
NDSS
1998
IEEE
15 years 8 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
DATE
2005
IEEE
113views Hardware» more  DATE 2005»
15 years 9 months ago
Hardware-Software Design of a Smart Sensor for Fully-Electronic DNA Hybridization Detection
This paper describes the design of a smart sensor for label-free detection of DNA hybridization. The sensor is based on a direct electrical transduction principle: it measures imp...
Claudio Stagni, Carlotta Guiducci, Massimo Lanzoni...