Sciweavers

3686 search results - page 33 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
PST
2008
13 years 9 months ago
The Uncertainty of the Truth
Can we trust without any reliable truth information? Most trust architectures work in a similar way: a trustor makes some observations, rates the trustee, and makes recommendations...
Michel Deriaz
JAVA
1999
Springer
13 years 12 months ago
Interfacing Java to the Virtual Interface Architecture
User-level network interfaces (UNIs) have reduced the overheads of communication by exposing the buffers used by the network interface DMA engine to the applications. This removes...
Chi-Chao Chang, Thorsten von Eicken
ASPLOS
2008
ACM
13 years 9 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
IPPS
2005
IEEE
14 years 1 months ago
Virtual Gateways in the DECOS Integrated Architecture
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
ISSS
1996
IEEE
169views Hardware» more  ISSS 1996»
13 years 12 months ago
The Use of a Virtual Instruction Set for the Software Synthesis of HW/SW Embedded Systems
The application range of the embedded computing is going to cover the majority of the market products spanning from consumer electronic, automotive, telecom and process control. F...
Alessandro Balboni, William Fornaciari, M. Vincenz...