Sciweavers

2513 search results - page 435 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
IPSN
2005
Springer
14 years 3 months ago
Avrora: scalable sensor network simulation with precise timing
— Simulation can be an important step in the development of software for wireless sensor networks and has been the subject of intense research in the past decade. While most prev...
Ben Titzer, Daniel K. Lee, Jens Palsberg
VMCAI
2005
Springer
14 years 3 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
AOSD
2004
ACM
14 years 3 months ago
Virtual machine support for dynamic join points
A widespread implementation approach for the join point mechanism of aspect-oriented languages is to instrument areas in code that match the static part of pointcut designators, i...
Christoph Bockisch, Michael Haupt, Mira Mezini, Kl...
SEM
2004
Springer
14 years 3 months ago
Supporting Generalized Context Interactions
Abstract. Context-awareness refers to a computing model where application behavior is driven by a continually-changing environment. Mobile computing poses unique challenges to cont...
Gregory Hackmann, Christine Julien, Jamie Payton, ...
SBCCI
2003
ACM
213views VLSI» more  SBCCI 2003»
14 years 3 months ago
Algorithms and Tools for Network on Chip Based System Design
Network on Chip (NoC) is a new paradigm for designing core based System on Chips. It supports high degree of reusability and is scalable. In this paper, an efficient Two-Step Gene...
Tang Lei, Shashi Kumar