<--- Back to Details
First PageDocument Content
Fault-tolerant computer systems / Technology / Packaging / Tamper resistance / Software quality / Application checkpointing / Copy protection / Error detection and correction / Encryption / Cryptography / Computing / Security
Date: 2009-07-03 12:00:41
Fault-tolerant computer systems
Technology
Packaging
Tamper resistance
Software quality
Application checkpointing
Copy protection
Error detection and correction
Encryption
Cryptography
Computing
Security

Tamper-Tolerant Software: Modeling and Implementation Mariusz H. Jakubowski† , Chit Wei (Nick) Saw† and Ramarathnam

Add to Reading List

Source URL: research.microsoft.com

Download Document from Source Website

File Size: 299,31 KB

Share Document on Facebook

Similar Documents

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Daniels_meeting_cover.eps

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

1  Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document