Sciweavers

2178 search results - page 294 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2008
ACM
13 years 10 months ago
When good instructions go bad: generalizing return-oriented programming to RISC
This paper reconsiders the threat posed by Shacham's "return-oriented programming" -- a technique by which WX-style hardware protections are evaded via carefully cr...
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan ...
CODES
2009
IEEE
14 years 2 months ago
A variation-tolerant scheduler for better than worst-case behavioral synthesis
– There has been a recent shift in design paradigms, with many turning towards yield-driven approaches to synthesize and design systems. A major cause of this shift is the contin...
Jason Cong, Albert Liu, Bin Liu
AIM
2006
13 years 8 months ago
Using 4D/RCS to Address AI Knowledge Integration
In this paper, we show how 4D/RCS incorporates and integrates multiple types of disparate knowledge representation techniques into a common, unifying architecture. 4D/RCS is based...
Craig Schlenoff, James S. Albus, Elena Messina, An...
MAM
2002
128views more  MAM 2002»
13 years 7 months ago
Component-based development of DSP software for mobile communication terminals
DSP software development has been tied down by extreme computational requirements. Furthermore, the DSP development tools available today are less advanced than in other embedded ...
Kari Jyrkkä, Olli Silvén, Olli Ali-Yrk...
SP
2000
IEEE
14 years 11 days ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum