Sciweavers

359 search results - page 39 / 72
» Refactoring support for the C development tooling
Sort
View
IMC
2007
ACM
13 years 9 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
ICSEA
2006
IEEE
14 years 1 months ago
Extracting Simulation Models from Complex Embedded Real-Time Systems
A modeling process is presented for extracting timingaccurate simulation models from complex embedded realtime systems. The process is supported by two complementary methods for t...
Johan Andersson, Joel Huselius, Christer Norstr&ou...
SIGSOFT
1994
ACM
14 years 6 hour ago
Exploiting Style in Architectural Design Environments
As the design of software architectures emerges as a discipline within software engineering, it will become increasingly important to support architectural description and analysi...
David Garlan, Robert Allen, John Ockerbloom
ULPAA
1994
143views Hardware» more  ULPAA 1994»
13 years 9 months ago
Configuring Function-based Communication Protocols for Multimedia Applications
Next generation communication systems must support diverse applications operating over high-performance local, metropolitan, and wide area networks. This paper describes a framewo...
Douglas C. Schmidt, Burkhard Stiller, Tatsuya Suda...
DAC
2008
ACM
14 years 9 months ago
Specify-explore-refine (SER): from specification to implementation
Driven by increasing complexity and reliability demands, the Japanese Aerospace Exploration Agency (JAXA) in 2004 commissioned development of ELEGANT, a complete SpecC-based envir...
Andreas Gerstlauer, Junyu Peng, Dongwan Shin, Dani...