Sciweavers

6308 search results - page 1197 / 1262
» Modeling Urgency in Timed Systems
Sort
View
CODES
2007
IEEE
15 years 10 months ago
HW/SW co-design for Esterel processing
We present a co-synthesis approach that accelerates reactive software processing by moving the calculation of complex expressions into external combinational hardware. The startin...
Sascha Gädtke, Claus Traulsen, Reinhard von H...
ACSAC
2006
IEEE
15 years 10 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
INFOCOM
2006
IEEE
15 years 10 months ago
JetMax: Scalable Max-Min Congestion Control for High-Speed Heterogeneous Networks
Recent surge of interest towards congestion control that relies on single-link feedback (e.g., XCP, RCP, MaxNet, EMKC, VCP), suggests that such systems may offer certain benefit...
Yueping Zhang, Derek Leonard, Dmitri Loguinov
RSP
2005
IEEE
164views Control Systems» more  RSP 2005»
15 years 9 months ago
High Level Synthesis for Data-Driven Applications
Abstract— John von Neumann proposed his famous architecture in a context where hardware was very expensive and bulky. His goal was to maximize functionality with minimal hardware...
Etienne Bergeron, Xavier Saint-Mleux, Marc Feeley,...
SACMAT
2005
ACM
15 years 9 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
« Prev « First page 1197 / 1262 Last » Next »