Sciweavers

122 search results - page 22 / 25
» Comparing the size of .NET applications with native code
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 9 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ADBIS
1997
Springer
146views Database» more  ADBIS 1997»
13 years 11 months ago
S-Index: a Hybrid Structure for Text Retrieval
Today, two classes of indexing methods enjoying wide applicability are the Inverted Index and the Superimposed Coding based Signature File (SC-SF). The former is most efficient i...
Dimitrios Dervos, P. Linardis, Yannis Manolopoulos
DATE
2010
IEEE
130views Hardware» more  DATE 2010»
13 years 11 months ago
Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller
Abstract—Supporting Distributed Shared Memory (DSM) is essential for multi-core Network-on-Chips for the sake of reusing huge amount of legacy code and easy programmability. We p...
Xiaowen Chen, Zhonghai Lu, Axel Jantsch, Shuming C...
ICSM
2009
IEEE
14 years 2 months ago
Introducing a test suite similarity metric for event sequence-based test cases
Most of today’s event driven software (EDS) systems are tested using test cases that are carefully constructed as sequences of events; they test the execution of an event in the...
Penelope A. Brooks, Atif M. Memon
PLDI
2006
ACM
14 years 1 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith