Sciweavers

2513 search results - page 48 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 10 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ASAP
1997
IEEE
92views Hardware» more  ASAP 1997»
14 years 1 months ago
Optimized software synthesis for synchronous dataflow
This paper reviews a set of techniques for compiling dataflow-based, graphical programs for embedded signal processing applications into efficient implementations on programmable ...
Shuvra S. Bhattacharyya, Praveen K. Murthy, Edward...
FORTE
1998
13 years 11 months ago
Hardware - Software Co-design of embedded telecommunication systems using multiple formalisms for application development
: In this paper a co-design methodology based on multiformalism modelling is presented. It defines a platform that integrates different notations and, the necessary mechanisms to h...
Nikos S. Voros, S. K. Tsasakou, C. Valderrama, S. ...
SNPD
2008
13 years 11 months ago
Tools and Techniques for Model Checking Networked Programs
For software executing several threads in parallel, testing is unreliable, as it cannot cover all thread schedules. Model checking, however, can cover all possible thread interlea...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
SIGSOFT
2007
ACM
14 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna