Sciweavers

2056 search results - page 278 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
EUROMICRO
2005
IEEE
14 years 3 months ago
Distribution of a Hierarchical Component in a Non-Connected Environment
This article addresses the utilisation of the componentbased approach for building and executing a distributed application that can offer services over a set of heterogeneous and ...
Didier Hoareau, Yves Mahéo
CBMS
2008
IEEE
14 years 5 days ago
Workflow Integration in VL-e Medical
This paper presents the integration of a workflow management system into the VL-e Medical software architecture. Workflows are designed with the Taverna workbench, and then execute...
Tristan Glatard, Kamel Boulebiar, Sílvia D....
DSRT
2005
IEEE
14 years 3 months ago
Investigating Distributed Simulation at The Ford Motor Company
Engine production is a complex process that requires the manufacturing and assembly of a wide variety of components to create a varied product mix. Simulation plays a key role in ...
Simon J. E. Taylor, Leif Bohli, Xiaoguang Wang, St...
DAC
2008
ACM
13 years 12 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
DRM
2005
Springer
14 years 3 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi