Sciweavers

1177 search results - page 109 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
14 years 18 days ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
ICSE
2008
IEEE-ACM
14 years 9 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
ARCS
2007
Springer
14 years 3 months ago
Architecture for Collaborative Business Items
Sensor network technology is pushing towards integration into the business world. By using sensor node hardware to augment real life business items it is possible to capture the wo...
Till Riedel, Christian Decker, Phillip Scholl, Alb...
EMSOFT
2004
Springer
14 years 2 months ago
Reuse of software in distributed embedded automotive systems
Until recently, in the automotive industry, reuse of software has entirely been a typical activity of suppliers. They try to reduce the increasing software development costs that ...
Bernd Hardung, Thorsten Kölzow, Andreas Kr&uu...
DATE
2009
IEEE
91views Hardware» more  DATE 2009»
14 years 23 days ago
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage
Abstract--Hardware/Software codesign of Elliptic Curve Cryptography has been extensively studied in recent years. However, most of these designs have focused on the computational a...
Xu Guo, Patrick Schaumont