Sciweavers

6660 search results - page 1282 / 1332
» Highly-Available Application Integration
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 7 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 7 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
ACSAC
2003
IEEE
15 years 7 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
CC
2001
Springer
150views System Software» more  CC 2001»
15 years 7 months ago
SmartTools: A Generator of Interactive Environments Tools
SmartTools is a development environment generator that provides a structure editor and semantic tools as main features. The well-known visitor pattern technique is commonly used fo...
Isabelle Attali, Carine Courbis, Pascal Degenne, A...
ICCAD
1997
IEEE
137views Hardware» more  ICCAD 1997»
15 years 7 months ago
Optimization techniques for high-performance digital circuits
The relentless push for high performance in custom digital circuits has led to renewed emphasis on circuit optimization or tuning. The parameters of the optimization are typically...
Chandramouli Visweswariah
« Prev « First page 1282 / 1332 Last » Next »