Sciweavers

1177 search results - page 25 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
CISIS
2009
IEEE
14 years 3 months ago
Designing Regular Network-on-Chip Topologies under Technology, Architecture and Software Constraints
—Regular multi-core processors are appearing in the embedded system market as high performance software programmable solutions. The use of regular interconnect fabrics for them a...
Francisco Gilabert Villamón, Daniele Ludovi...
IPPS
2008
IEEE
14 years 3 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
COMPSAC
1999
IEEE
14 years 29 days ago
Initial Design of the "Plug-n-Analyze" Framework for Architecture Tradeoff Analysis
This paper presents an initial design of the "Plug-nAnalyze" framework for the tradeoff analysisin determining architecture alternatives that have different strength and...
Hoh In, Ana Erendira Flores-Mendoza
WETICE
2003
IEEE
14 years 1 months ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...