Sciweavers

1449 search results - page 245 / 290
» Secure and Efficient Metering
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 6 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
14 years 4 months ago
Automatic Voltage Controllers for South Korean Power System
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
Xing Liu, Vaithianathan Venkatasubramanian, Tae-Ky...
COMPSAC
2009
IEEE
14 years 4 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
14 years 4 months ago
Architectural support for low overhead detection of memory violations
Violations in memory references cause tremendous loss of productivity, catastrophic mission failures, loss of privacy and security, and much more. Software mechanisms to detect me...
Saugata Ghose, Latoya Gilgeous, Polina Dudnik, Ane...
ICDCS
2008
IEEE
14 years 4 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...