Sciweavers

533 search results - page 69 / 107
» Control flow based obfuscation
Sort
View
93
Voted
DATE
2004
IEEE
136views Hardware» more  DATE 2004»
15 years 6 months ago
Data Windows: A Data-Centric Approach for Query Execution in Memory-Resident Databases
Structured embedded databases are currently becoming an integrated part of embedded systems, thus, enabling higher standards in system automation. These embedded databases are typ...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
NETWORKING
2004
15 years 4 months ago
Improving Distributed Firewalls Performance through Vertical Load Balancing
In this paper we present an extension to an existing hash based packet classification technique in order to improve its performance in a distributed network access control environm...
Olivier Paul
142
Voted
MEMICS
2010
14 years 9 months ago
Instructor Selector Generation from Architecture Description
We describe an automated way to generate data for a practical LLVM instruction selector based on machine-generated description of the target architecture at register transfer leve...
Miloslav Trmac, Adam Husar, Jan Hranac, Tomas Hrus...
CODES
1999
IEEE
15 years 6 months ago
Scheduling with optimized communication for time-triggered embedded systems
We present an approach to process scheduling for synthesis of safety-critical distributed embedded systems. Our system model captures both the flow of data and that of control. Th...
Paul Pop, Petru Eles, Zebo Peng
ICC
2000
IEEE
124views Communications» more  ICC 2000»
15 years 7 months ago
A Fair Traffic Conditioner for the Assured Service in a Differentiated Services Internet
— A research issue under investigation in the context of differentiated services (DiffServ) is the fair distribution of bandwidth between aggregates sharing the same Assured Forw...
Ilias Andrikopoulos, Lloyd Wood, George Pavlou