Sciweavers

1352 search results - page 146 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 11 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
TDSC
2011
13 years 5 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
VLDB
2005
ACM
133views Database» more  VLDB 2005»
14 years 3 months ago
Caching with 'Good Enough' Currency, Consistency, and Completeness
SQL extensions that allow queries to explicitly specify data quality requirements in terms of currency and consistency were proposed in an earlier paper. This paper develops a dat...
Hongfei Guo, Per-Åke Larson, Raghu Ramakrish...
PPL
2008
117views more  PPL 2008»
13 years 10 months ago
Operating Systems in silicon and the Dynamic Management of Resources in Many-Core Chips
This discussion paper explores the problems of operating systems support when implementing concurrency controls at the level of the instruction set in processors designed for mult...
Chris R. Jesshope
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
13 years 8 months ago
A proposal for real-time interfaces in SPEEDS
Abstract—The SPEEDS project is aimed at making rich components models (RCM) into a mature framework in all phases of the design of complex distributed embedded systems. The RCM m...
Purandar Bhaduri, Ingo Stierand