Sciweavers

1063 search results - page 117 / 213
» Programming Methodologies in GCLA
Sort
View
GPCE
2007
Springer
14 years 2 months ago
A type-centric framework for specifying heterogeneous, large-scale, component-oriented, architectures
Maintaining integrity, consistency, and enforcing conformance in architectures of large-scale systems requires specification and enforcement of many different forms of structural...
Georg Jung, John Hatcliff
COMSWARE
2006
IEEE
14 years 1 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 1 months ago
Functional Coverage Driven Test Generation for Validation of Pipelined Processors
Functional verification of microprocessors is one of the most complex and expensive tasks in the current system-on-chip design process. A significant bottleneck in the validatio...
Prabhat Mishra, Nikil D. Dutt
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
14 years 1 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
ICALP
2001
Springer
14 years 9 days ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung