Sciweavers

987 search results - page 117 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
DSD
2008
IEEE
130views Hardware» more  DSD 2008»
14 years 3 months ago
On the Need for Passive Monitoring in Sensor Networks
—Debugging and analyzing Wireless Sensor Networks (WSNs) are important tasks for improving the quality and performance of the network. In this paper, Pimoto is to be presented, w...
Abdalkarim Awad, Rodrigo Nebel, Reinhard German, F...
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
14 years 3 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...
SIGMETRICS
2011
ACM
245views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
Record and transplay: partial checkpointing for replay debugging across heterogeneous systems
Software bugs that occur in production are often difficult to reproduce in the lab due to subtle differences in the application environment and nondeterminism. To address this pr...
Dinesh Subhraveti, Jason Nieh
MUM
2009
ACM
160views Multimedia» more  MUM 2009»
14 years 3 months ago
Towards location-aware mobile web browsers
Location Based Services (LBS) promise interesting business opportunities. Today, most LBS are either implemented in hardware devices, or downloaded and installed by mobile phone u...
Stephan Karpischek, Fabio Magagna, Florian Michahe...
PODC
2004
ACM
14 years 2 months ago
Bringing practical lock-free synchronization to 64-bit applications
Many lock-free data structures in the literature exploit techniques that are possible only because state-of-the-art 64-bit processors are still running 32-bit operating systems an...
Simon Doherty, Maurice Herlihy, Victor Luchangco, ...