Sciweavers

224 search results - page 40 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
CHI
2008
ACM
14 years 8 months ago
Ubipay: conducting everyday payments with minimum user involvement
As services embedded into public spaces become increasingly transparent, one peripheral aspect of use continues to demand explicit user attention: payment. UbiPay is a system that...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Hiroak...
IEEECIT
2006
IEEE
14 years 1 months ago
A Trap-based Mechanism for Runtime Kernel Modification
Runtime modification of kernel code is a difficult problem. However, the need of modifiable kernel is increasing because new requirements and services that are unanticipated at th...
Young-Pil Kim, Jin-Hee Choi, Chuck Yoo
CIKM
2010
Springer
13 years 6 months ago
StableBuffer: optimizing write performance for DBMS applications on flash devices
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...
Yu Li, Jianliang Xu, Byron Choi, Haibo Hu
TEI
2010
ACM
158views Hardware» more  TEI 2010»
14 years 2 months ago
ChainMail: a configurable multimodal lining to enable sensate surfaces and interactive objects
The ChainMail system is a scalable electronic sensate skin that is designed as a dense sensor network. ChainMail is built from small (1”x1”) rigid circuit boards attached to t...
Behram F. T. Mistree, Joseph A. Paradiso
TPDS
2008
78views more  TPDS 2008»
13 years 7 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...