Sciweavers

9071 search results - page 5 / 1815
» A co-design modeling approach for computer network systems
Sort
View
DAC
2003
ACM
14 years 8 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
HASE
2008
IEEE
14 years 2 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICAC
2005
IEEE
14 years 1 months ago
Model-Driven Placement of Compute Tasks and Data in a Networked Utility
An important problem in resource management for networked resource-sharing systems is the simultaneous allocation of multiple resources to an application. Selfoptimizing systems m...
Piyush Shivam, Adriana Iamnitchi, Aydan R. Yumeref...
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu