Sciweavers

1042 search results - page 146 / 209
» Synthesis of Software Programs for Embedded Control Applicat...
Sort
View
FCCM
2011
IEEE
220views VLSI» more  FCCM 2011»
13 years 29 days ago
Reducing the Energy Cost of Irregular Code Bases in Soft Processor Systems
— This paper describes an architecture and FPGA synthesis toolchain for building specialized, energy-saving coprocessors called Irregular Code Energy Reducers (ICERs) for a wide ...
Manish Arora, Jack Sampson, Nathan Goulding-Hotta,...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
SRDS
2003
IEEE
14 years 2 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 9 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
EUROSYS
2007
ACM
14 years 6 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso