Sciweavers

1358 search results - page 164 / 272
» Communication Analysis for System-On-Chip Design
Sort
View
ACSAC
2002
IEEE
14 years 3 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICC
2008
IEEE
116views Communications» more  ICC 2008»
14 years 4 months ago
Nonlinear Turbo Codes for Higher-Order Modulations
— In 1982 Ungerboeck presented a set-partitioning design technique for trellis coded modulation (TCM). Although this technique directly assigns constellation points to the branch...
Miguel Griot, Andres I. Vila Casado, Richard D. We...
ICPPW
2008
IEEE
14 years 4 months ago
Replay-Based Synchronization of Timestamps in Event Traces of Massively Parallel Applications
Event traces are helpful in understanding the performance behavior of message-passing applications since they allow in-depth analyses of communication and synchronization patterns...
Daniel Becker, John C. Linford, Rolf Rabenseifner,...
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Future of Work: What Does Online Community Have to Do with It?
Amidst constant innovation in information and communication technologies, a new pattern of work is emerging. Hierarchical authority structures are giving way to greater decision-m...
Dejin Zhao, Mary Beth Rosson, Sandeep Purao
ECIS
2003
13 years 11 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica