Sciweavers

3902 search results - page 695 / 781
» Hardware Synthesis from C C Models
Sort
View
CODES
2006
IEEE
14 years 4 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
IEEEPACT
2006
IEEE
14 years 4 months ago
Two-level mapping based cache index selection for packet forwarding engines
Packet forwarding is a memory-intensive application requiring multiple accesses through a trie structure. The efficiency of a cache for this application critically depends on the ...
Kaushik Rajan, Ramaswamy Govindarajan
ASPLOS
2006
ACM
14 years 4 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
SASN
2006
ACM
14 years 4 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
SIGMETRICS
2006
ACM
106views Hardware» more  SIGMETRICS 2006»
14 years 4 months ago
Automatic logging of operating system effects to guide application-level architecture simulation
Modern architecture research relies heavily on applicationlevel detailed pipeline simulation. A time consuming part of building a simulator is correctly emulating the operating sy...
Satish Narayanasamy, Cristiano Pereira, Harish Pat...