Sciweavers

1949 search results - page 100 / 390
» Protective Interface Specifications
Sort
View
DATE
2004
IEEE
120views Hardware» more  DATE 2004»
14 years 1 months ago
Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of Study
In this paper we describe how we applied a BIST-based approach to the test of a logic core to be included in System-on-achip (SoC) environments. The approach advantages are the ab...
Paolo Bernardi, Guido Masera, Federico Quaglio, Ma...
LCR
2000
Springer
172views System Software» more  LCR 2000»
14 years 1 months ago
Achieving Robust, Scalable Cluster I/O in Java
We present Tigris, a high-performance computation and I/O substrate for clusters of workstations that is implemented entirely in Java. Tigris automatically balances resource load a...
Matt Welsh, David E. Culler
POPL
2005
ACM
14 years 10 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
SACMAT
2003
ACM
14 years 3 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
ACSAC
1999
IEEE
14 years 2 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer