Sciweavers

2814 search results - page 76 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
DATE
2005
IEEE
91views Hardware» more  DATE 2005»
15 years 10 months ago
Reliability-Centric High-Level Synthesis
Importance of addressing soft errors in both safety critical applications and commercial consumer products is increasing, mainly due to ever shrinking geometries, higher-density c...
Suleyman Tosun, Nazanin Mansouri, Ercument Arvas, ...
CCS
2004
ACM
15 years 10 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
138
Voted
ASAP
2005
IEEE
112views Hardware» more  ASAP 2005»
15 years 10 months ago
On the Advantages of Serial Architectures for Low-Power Reliable Computations
This paper explores low-power reliable microarchitectures for addition. Power, speed, and reliability (both defect- and fault-tolerance) are important metrics of system design, sp...
Valeriu Beiu, Snorre Aunet, Jabulani Nyathi, Ray R...
151
Voted
PERVASIVE
2004
Springer
15 years 10 months ago
Issues with RFID Usage in Ubiquitous Computing Applications
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various s...
Christian Floerkemeier, Matthias Lampe
122
Voted
CCS
2008
ACM
15 years 6 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...