Sciweavers

987 search results - page 175 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
COOPIS
2002
IEEE
14 years 1 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
EUROCAST
1997
Springer
156views Hardware» more  EUROCAST 1997»
14 years 28 days ago
A Computational Model for Visual Size, Location and Movement
The ability to detect object size, location and movement is essential for a visual system in either a biological or man made environment. In this paper we present a model for esti...
Miguel Alemán-Flores, K. Nicholas Leibovic,...
LCN
2002
IEEE
14 years 1 months ago
A User Level Framework for Ad Hoc Routing
The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in a large class of wireless applications. Many appl...
Jérémie Allard, Paul Gonin, Minoo Si...
PPOPP
2003
ACM
14 years 2 months ago
Improving server software support for simultaneous multithreaded processors
Simultaneous multithreading (SMT) represents a fundamental shift in processor capability. SMT's ability to execute multiple threads simultaneously within a single CPU offers ...
Luke McDowell, Susan J. Eggers, Steven D. Gribble
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
14 years 3 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...