Sciweavers

3792 search results - page 134 / 759
» Techniques for Trusted Software Engineering
Sort
View
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
16 years 4 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James
DAC
1998
ACM
16 years 4 months ago
A Case Study in Embedded System Design: An Engine Control Unit
A number of techniques and software tools for embedded system design have been recently proposed. However, the current practice in the designer community is heavily based on manua...
Alberto L. Sangiovanni-Vincentelli, Antonino Damia...
133
Voted
TSE
2010
125views more  TSE 2010»
15 years 2 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
ICAS
2008
IEEE
274views Robotics» more  ICAS 2008»
15 years 10 months ago
Model-Driven Engineering of Multi-target Plastic User Interfaces
A Multi-target user interface is composed of a series of interconnected variations of the same user interfaces, but tailored for different targets or different contexts of use. Wh...
Benoît Collignon, Jean Vanderdonckt, Gaë...
ICSM
2005
IEEE
15 years 9 months ago
Incremental Maintenance of Software Artifacts
We have built a software development tool, CLIME, that uses constraints to ensure the consistency of the different artifacts associated with software. This approach to software dev...
Steven P. Reiss