Sciweavers

1528 search results - page 128 / 306
» Performance Assertion Checking
Sort
View
ACMSE
2004
ACM
15 years 6 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
121
Voted
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 6 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
CAV
2010
Springer
173views Hardware» more  CAV 2010»
15 years 5 months ago
A Model Checker for AADL
We present a graphical toolset for verifying AADL models, which are gaining widespread acceptance in aerospace, automobile and avionics industries for comprehensively specifying sa...
Marco Bozzano, Alessandro Cimatti, Joost-Pieter Ka...
122
Voted
GLOBECOM
2009
IEEE
15 years 5 months ago
Near-Shannon-Limit Linear-Time-Encodable Nonbinary Irregular LDPC Codes
—In this paper, we present a novel method to construct nonbinary irregular LDPC codes whose parity check matrix has only column weights of 2 and t, where t ≥ 3. The constructed...
Jie Huang, Shengli Zhou, Peter Willett
CAV
2008
Springer
99views Hardware» more  CAV 2008»
15 years 4 months ago
Functional Verification of Power Gated Designs by Compositional Reasoning
Power gating is a technique for low power design in which whole sections of the chip are powered off when they are not needed, and powered back on when they are. Functional correct...
Cindy Eisner, Amir Nahir, Karen Yorav