Sciweavers

1239 search results - page 128 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
ITNG
2008
IEEE
14 years 2 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
FPGA
2004
ACM
147views FPGA» more  FPGA 2004»
14 years 1 months ago
The SFRA: a corner-turn FPGA architecture
FPGAs normally operate at whatever clock rate is appropriate for the loaded configuration. When FPGAs are used as computational devices in a larger system, however, it is better ...
Nicholas Weaver, John R. Hauser, John Wawrzynek
CHI
2008
ACM
14 years 8 months ago
A solution to interface evolution issues: the multi-layer interface
Updating an operational system is often complex and awkward. In this article, we will explain how the concept of multi-layer interface could facilitate the evolution of operationa...
Bruno Merlin, Christophe Hurter, Raïlane Benh...
OSDI
2008
ACM
14 years 8 months ago
Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling
Computational RFIDs (CRFIDs) provide flexible, general-purpose computation on a microcontroller via energy that is harvested and stored in capacitors rather than batteries. Our co...
Benjamin Ransford, Shane S. Clark, Mastooreh Salaj...
ACSAC
2002
IEEE
14 years 27 days ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen