Sciweavers

8623 search results - page 159 / 1725
» Software engineering for secure systems
Sort
View
DATE
2002
IEEE
94views Hardware» more  DATE 2002»
14 years 2 months ago
A Powerful System Design Methodology Combining OCAPI and Handel-C for Concept Engineering
In this paper, we present an efficient methodology to validate high performance algorithms and prototype them using reconfigurable hardware. We follow a strict topdown Hardware/So...
Klaus Buchenrieder, Andreas Pyttel, Alexander Sedl...
FSTTCS
2009
Springer
14 years 3 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
CSREAEEE
2006
103views Business» more  CSREAEEE 2006»
13 years 10 months ago
Software Engineering Employee Motivational Capital Model: SE-EMCM
The business world has been reinventing the human. Employee participative transition projects for management strategies are becoming more important in IT organizations day by day....
Serdar Turkeli
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
14 years 2 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
ASPLOS
2008
ACM
13 years 11 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...