Sciweavers

6348 search results - page 3 / 1270
» Extensible control architectures
Sort
View
DAC
2004
ACM
14 years 7 months ago
Characterizing embedded applications for instruction-set extensible processors
Extensible processors, which allow customization for an application domain by extending the core instruction set architecture, are becoming increasingly popular for embedded syste...
Pan Yu, Tulika Mitra
CL
2010
Springer
13 years 6 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
SAJ
2002
92views more  SAJ 2002»
13 years 6 months ago
An access control architecture for XML documents in workflow environments
The eXtensible Markup Language (XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which informati...
Reinhardt A. Botha, Jan H. P. Eloff
ACSD
2005
IEEE
90views Hardware» more  ACSD 2005»
14 years 7 days ago
Extensible and Scalable Time Triggered Scheduling
The objective of this paper is to present how to design a system that can accommodate additional functionality with either no changes to the design or adding architectural modules...
Wei Zheng, Jike Chong, Claudio Pinello, Sri Kanaja...
ACSAC
2006
IEEE
14 years 20 days ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr