Sciweavers

987 search results - page 22 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
CATA
2003
13 years 9 months ago
A Programmable Logic-Based Implementation of Ultra-Fast Parallel Binary Image Morphological Operations
Binary morphological operations are a building block in many computer vision applications. Several iterative morphological operations are commonly performed for image analysis res...
Songpol Ongwattanakul, Phaisit Chewputtanagul, Dav...
ISMVL
2008
IEEE
148views Hardware» more  ISMVL 2008»
14 years 2 months ago
Quantum Logic Implementation of Unary Arithmetic Operations
The mathematical property of inheritance for certain unary fixed point operations has recently been exploited to enable the efficient formulation of arithmetic algorithms and circ...
Mitchell A. Thornton, David W. Matula, Laura Spenn...
USENIX
2003
13 years 9 months ago
The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0
We explore the requirements, design, and implementation of the TrustedBSD MAC Framework. The TrustedBSD MAC Framework, integrated into FreeBSD 5.0, provides a flexible framework ...
Robert Watson, Wayne Morrison, Chris Vance, Brian ...
FCCM
2006
IEEE
170views VLSI» more  FCCM 2006»
13 years 11 months ago
An Architecture for Efficient Hardware Data Mining using Reconfigurable Computing Systems
The Apriori algorithm is a fundamental correlation-based data mining kernel used in a variety of fields. The innovation in this paper is a highly parallel custom architecture impl...
Zachary K. Baker, Viktor K. Prasanna
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang