Sciweavers

125 search results - page 23 / 25
» Remote attestation on program execution
Sort
View
CCS
2008
ACM
13 years 9 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
SACMAT
2009
ACM
14 years 2 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
ISCA
1999
IEEE
104views Hardware» more  ISCA 1999»
13 years 11 months ago
Is SC + ILP=RC?
Sequential consistency (SC) is the simplest programming interface for shared-memory systems but imposes program order among all memory operations, possibly precluding high perform...
Chris Gniady, Babak Falsafi, T. N. Vijaykumar
IROS
2009
IEEE
178views Robotics» more  IROS 2009»
14 years 2 months ago
Mobile robots for offshore inspection and manipulation
— This paper analyzes the potential to apply mobile service robots in offshore oil and gas producing environments. The required hardware and software components and abilities of ...
Matthias Bengel, Kai Pfeiffer, Birgit Graf, Alexan...
MIDDLEWARE
2004
Springer
14 years 25 days ago
A grid service broker for scheduling distributed data-oriented applications on global grids
: The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engag...
Srikumar Venugopal, Rajkumar Buyya, Lyle J. Winton