Sciweavers

723 search results - page 69 / 145
» A Logical Architecture of a Normative System
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 6 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
EMSOFT
2005
Springer
14 years 2 months ago
Pinapa: an extraction tool for SystemC descriptions of systems-on-a-chip
SystemC is becoming a de-facto standard for the description of complex systems-on-a-chip. It enables system-level descriptions of SoCs: the same language is used for the descripti...
Matthieu Moy, Florence Maraninchi, Laurent Maillet...
HT
2005
ACM
14 years 2 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
ISQED
2002
IEEE
106views Hardware» more  ISQED 2002»
14 years 1 months ago
Trading off Reliability and Power-Consumption in Ultra-low Power Systems
Critical systems like pace-makers, defibrillators, wearable computers and other electronic gadgets have to be designed not only for reliability but also for ultra-low power consu...
Atul Maheshwari, Wayne Burleson, Russell Tessier
AI
2007
Springer
14 years 3 months ago
Constructing a User Preference Ontology for Anti-spam Mail Systems
The judgment that whether an email is spam or non-spam may vary from person to person. Different individuals can have totally different responses to the same email based on their p...
Jongwan Kim, Dejing Dou, Haishan Liu, Donghwi Kwak