Sciweavers

174 search results - page 26 / 35
» Configuration of Aspects
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 7 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JUCS
2006
77views more  JUCS 2006»
13 years 7 months ago
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring
: More than 60,000 people die suddenly each year in France due to cardiac arrhythmias. The current techniques used to diagnose cardiac arrhythmias such as HOLTER, R.TEST and teleme...
Haiying Zhou, Kun Mean Hou, Laurent Gineste, Chris...
RTS
2006
132views more  RTS 2006»
13 years 7 months ago
A framework for modular analysis and exploration of heterogeneous embedded systems
Abstract The increasing complexity of heterogeneous systems-on-chip, SoC, and distributed embedded systems makes system optimization and exploration a challenging task. Ideally, a ...
Arne Hamann, Marek Jersak, Kai Richter, Rolf Ernst
TC
2008
13 years 7 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
JCP
2007
126views more  JCP 2007»
13 years 7 months ago
ADE: Utility Driven Self-management in a Networked Environment
ADE, autonomic distributed environment, is a system which engages autonomic elements to automatically take an existing centralized application and distribute it across available re...
Debzani Deb, M. Muztaba Fuad, Michael J. Oudshoorn