Sciweavers

2513 search results - page 94 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
CAV
2009
Springer
177views Hardware» more  CAV 2009»
14 years 10 months ago
Software Transactional Memory on Relaxed Memory Models
Abstract. Pseudo-code descriptions of STMs assume sequentially consistent program execution and atomicity of high-level STM operations like read, write, and commit. These assumptio...
Rachid Guerraoui, Thomas A. Henzinger, Vasu Singh
ICMCS
2006
IEEE
117views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Data Hiding for Speech Bandwidth Extension and its Hardware Implementation
Most of the current speech transmission systems are only able to deliver speech signals in a narrow frequency band. This narrowband speech is characterized by a thin and muffled ...
Fan Wu, Siyue Chen, Henry Leung
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
DRM
2007
Springer
14 years 4 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
TACAS
2005
Springer
155views Algorithms» more  TACAS 2005»
14 years 3 months ago
Context-Bounded Model Checking of Concurrent Software
The interaction among concurrently executing threads of a program results in insidious programming errors that are difficult to reproduce and fix. Unfortunately, the problem of ve...
Shaz Qadeer, Jakob Rehof