Sciweavers

648 search results - page 33 / 130
» Software requirements validation via task analysis
Sort
View
WISA
2004
Springer
14 years 3 months ago
Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks,...
Elena Trichina, Lesya Korkishko
WCRE
2003
IEEE
14 years 3 months ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
CORR
2011
Springer
197views Education» more  CORR 2011»
13 years 1 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
VLSID
2002
IEEE
192views VLSI» more  VLSID 2002»
14 years 2 months ago
Static and Dynamic Variable Voltage Scheduling Algorithms for Real-Time Heterogeneous Distributed Embedded Systems
à This paper addresses the problem of static and dynamic variable voltage scheduling of multi-rate periodic task graphs (i.e., tasks with precedence relationships) and aperiodic t...
Jiong Luo, Niraj K. Jha
EMSOFT
2010
Springer
13 years 7 months ago
Modeling buffers with data refresh semantics in automotive architectures
Automotive architectures consist of multiple electronic control units (ECUs) which run distributed control applications. Such ECUs are connected to sensors and actuators and commu...
Linh Thi Xuan Phan, Reinhard Schneider, Samarjit C...