Sciweavers

1210 search results - page 84 / 242
» Secure Logic Synthesis
Sort
View
POPL
2007
ACM
14 years 10 months ago
Context logic as modal logic: completeness and parametric inexpressivity
Separation Logic, Ambient Logic and Context Logic are based on a similar style of reasoning about structured data. They each consist of a structural (separating) composition for r...
Cristiano Calcagno, Philippa Gardner, Uri Zarfaty
FPL
2009
Springer
86views Hardware» more  FPL 2009»
14 years 2 months ago
Improving logic density through synthesis-inspired architecture
We leverage properties of the logic synthesis netlist to define both a logic element architecture and an associated technology mapping algorithm that together provide improved lo...
Jason Helge Anderson, Qiang Wang
ICCS
2007
Springer
14 years 2 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
CCECE
2006
IEEE
14 years 4 months ago
AOP Extension for Security Testing of Programs
The purpose of this paper is to use the aspect-oriented programming (AOP) paradigm for security testing. AOP allows security experts to develop and inject separate modules for con...
Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhen...
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 3 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel