Sciweavers

2015 search results - page 51 / 403
» Hidden Software Capabilities
Sort
View
ISI
2005
Springer
14 years 2 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
ICSE
2008
IEEE-ACM
14 years 9 months ago
The application of knowledge-sharing workspace paradigm for software architecture processes
Management of architectural knowledge is vital for improving an organisation's capabilities in software architecture. Recently, there have been many efforts to develop variou...
Muhammad Ali Babar
IWANN
2007
Springer
14 years 3 months ago
A Software Framework for Tuning the Dynamics of Neuromorphic Silicon Towards Biology
This paper presents configuration methods for an existing neuromorphic hardware and shows first experimental results. The utilized mixed-signal VLSI1 device implements a highly a...
Daniel Brüderle, Andreas Grübl, Karlhein...
IH
2005
Springer
14 years 2 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
APSEC
2002
IEEE
14 years 2 months ago
Contextual Matching of Software Library Components
Many automated programming environments construct software by integrating predefined components from a software library. A fundamental challenge in this process is to match the p...
Colin J. Fidge