Sciweavers

2257 search results - page 42 / 452
» Secure program partitioning
Sort
View
CN
2000
76views more  CN 2000»
13 years 8 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ICPP
1998
IEEE
14 years 29 days ago
A memory-layout oriented run-time technique for locality optimization
Exploiting locality at run-time is a complementary approach to a compiler approach for those applications with dynamic memory access patterns. This paper proposes a memory-layout ...
Yong Yan, Xiaodong Zhang, Zhao Zhang
JMLC
2000
Springer
14 years 9 days ago
Derivation of Secure Parallel Applications by Means of Module Embedding
An enhancement to modular languages called module embedding facilitates the development and utilization of secure generic parallel algorithms.
Atanas Radenski
ACSAC
1999
IEEE
14 years 1 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
ICCAD
2003
IEEE
142views Hardware» more  ICCAD 2003»
14 years 5 months ago
Energy Optimization of Distributed Embedded Processors by Combined Data Compression and Functional Partitioning
Transmitting compressed data can reduce inter-processor communication traffic and create new opportunities for DVS (dynamic voltage scaling) in distributed embedded systems. Howe...
Jinfeng Liu, Pai H. Chou