Sciweavers

2236 search results - page 377 / 448
» Secure Software Design in Practice
Sort
View
IAT
2010
IEEE
13 years 9 months ago
Event Study Approach for Validating Agent-Based Trading Simulations
In this paper, we introduce how one can validate an event-centric trading simulation platform that is built with multi-agent technology. The issue of validation is extremely import...
Shih-Fen Cheng
TCAD
2010
116views more  TCAD 2010»
13 years 5 months ago
MeshWorks: A Comprehensive Framework for Optimized Clock Mesh Network Synthesis
Clock mesh networks are well known for their variation tolerance. But their usage is limited to high-end designs due to the significantly high resource requirements compared to clo...
Anand Rajaram, David Z. Pan
TCOM
2010
98views more  TCOM 2010»
13 years 5 months ago
Large-Girth Nonbinary QC-LDPC Codes of Various Lengths
In this paper, we construct nonbinary quasi-cyclic low-density parity-check (QC-LDPC) codes whose parity check matrices consist of an array of square sub-matrices which are either ...
Jie Huang, Lei Liu, Wuyang Zhou, Shengli Zhou
ASWEC
2006
IEEE
14 years 5 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
ANCS
2007
ACM
14 years 3 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos