Sciweavers

1177 search results - page 124 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ECLIPSE
2005
ACM
13 years 11 months ago
Tool support for feature-oriented software development: featureIDE: an Eclipse-based approach
Software program families have a long tradition and will gain momentum in the future. Today’s research tries to move software development to a new quality of industrial producti...
Thomas Leich, Sven Apel, Laura Marnitz, Gunter Saa...
DAC
2009
ACM
14 years 3 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
CODES
2006
IEEE
14 years 3 months ago
System-level power-performance trade-offs in bus matrix communication architecture synthesis
System-on-chip communication architectures have a significant impact on the performance and power consumption of modern multiprocessor system-on-chips (MPSoCs). However, customiza...
Sudeep Pasricha, Young-Hwan Park, Fadi J. Kurdahi,...
ASWSD
2004
Springer
14 years 2 months ago
Validation of Component and Service Federations in Automotive Software Applications
Abstract The automotive domain is one of the most promising areas for component and service technologies in the near future. Vehicles are increasingly becoming integrated systems w...
Luciano Baresi, Carlo Ghezzi
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 2 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...