Sciweavers

94 search results - page 17 / 19
» SHIM: A Language for Hardware Software Integration
Sort
View
CCS
2003
ACM
14 years 23 days ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
MEMOCODE
2008
IEEE
14 years 1 months ago
Virtual prototyping AADL architectures in a polychronous model of computation
While synchrony and asynchrony are two distinct concepts of concurrency theory, effective and formally defined embedded system design methodologies usually mix the best from both...
Ma Yue, Jean-Pierre Talpin, Thierry Gautier
SIGITE
2005
ACM
14 years 1 months ago
Towards using online portfolios in computing courses
The direct experience we had with teaching a summer pre-college computing course in which we adopted an online portfolio approach has led us to consider the use of online portfoli...
Bryan Higgs, Mihaela Sabin
EUROMED
2010
13 years 6 months ago
Modeling Procedural Knowledge: A Generative Modeler for Cultural Heritage
Within the last few years generative modeling techniques have gained attention especially in the context of cultural heritage. As a generative model describes a rather ideal object...
Christoph Schinko, Martin Strobl, Torsten Ullrich,...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Revel8or: Model Driven Capacity Planning Tool Suite
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Liming Zhu, Yan Liu, Ngoc Bao Bui, Ian Gorton