Sciweavers

1801 search results - page 181 / 361
» Implementation-Oriented Secure Architectures
Sort
View
114
Voted
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
15 years 10 months ago
Architectural support for low overhead detection of memory violations
Violations in memory references cause tremendous loss of productivity, catastrophic mission failures, loss of privacy and security, and much more. Software mechanisms to detect me...
Saugata Ghose, Latoya Gilgeous, Polina Dudnik, Ane...
ICSOC
2007
Springer
15 years 9 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...
122
Voted
VTC
2006
IEEE
107views Communications» more  VTC 2006»
15 years 9 months ago
Architecture of an Always Best Connected Vehicular Communication Gateway
Abstract— MobilitY and CollAboRative Work in European Vehicle Emergency NeTworks (MYCAREVENT) is an European Project of the 6th Framework Program [1], and aims to optimize the Eu...
Erik Weiss, M. Muehleisen, Carl-Herbert Rokitansky...
117
Voted
DSD
2005
IEEE
104views Hardware» more  DSD 2005»
15 years 9 months ago
Design of Transport Triggered Architecture Processors for Wireless Encryption
Transport Triggered Architecture (TTA) offers a costeffective trade-off between the size and performance of ASICs and the programmability of general-purpose processors. In this pa...
Panu Hämäläinen, Jari Heikkinen, Ma...
125
Voted
SIGCOMM
2005
ACM
15 years 9 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson