Sciweavers

170 search results - page 12 / 34
» Externally verifiable code execution
Sort
View
PDCAT
2004
Springer
14 years 25 days ago
Tamper Resistant Software by Integrity-Based Encryption
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon
TCSB
2008
13 years 7 months ago
Robustness to Code and Data Deletion in Autocatalytic Quines
Abstract. Software systems nowadays are becoming increasingly complex and vulnerable to all sorts of failures and attacks. There is a rising need for robust self-repairing systems ...
Thomas Meyer, Daniel Schreckling, Christian F. Tsc...
ASPDAC
2006
ACM
124views Hardware» more  ASPDAC 2006»
14 years 1 months ago
Functional modeling techniques for efficient SW code generation of video codec applications
–Architectures with multiple programmable cores are becoming more attractive for video codec applications because they can provide highly concurrent computation and support multi...
Sang-Il Han, Soo-Ik Chae, Ahmed Amine Jerraya
ICWE
2005
Springer
14 years 1 months ago
Towards Model-Driven Testing of a Web Application Generator
Abstract. Conceptual modelling is a promising approach for Web application development, thanks to innovative CASE tools that can transform high-level specifications into executabl...
Luciano Baresi, Piero Fraternali, Massimo Tisi, Sa...
VEE
2005
ACM
119views Virtualization» more  VEE 2005»
14 years 1 months ago
A programmable microkernel for real-time systems
We present a new software system architecture for the implementation of hard real-time applications. The core of the system is a microkernel whose reactivity (interrupt handling a...
Christoph M. Kirsch, Marco A. A. Sanvido, Thomas A...