Sciweavers

2204 search results - page 74 / 441
» Analyzing architectural styles
Sort
View
ICCAD
2003
IEEE
136views Hardware» more  ICCAD 2003»
16 years 1 months ago
Synthesis of Heterogeneous Distributed Architectures for Memory-Intensive Applications
— Memory-intensive applications present unique challenges to an ASIC designer in terms of the choice of memory organization, memory size requirements, bandwidth and access latenc...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...
CODES
2005
IEEE
15 years 10 months ago
Power-smart system-on-chip architecture for embedded cryptosystems
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
PERCOM
2004
ACM
16 years 3 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
APSEC
2004
IEEE
15 years 8 months ago
SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing
Sensors in ubiquitous computing provide a new opportunity to extend existing RFID capabilities to situation-awareness. This paper proposes several alternatives of the Situation-Aw...
Dongwon Jeong, Young-Gab Kim, Hoh Peter In
CORR
2006
Springer
152views Education» more  CORR 2006»
15 years 4 months ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle