Sciweavers

1240 search results - page 234 / 248
» Trusted Design in FPGAs
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
13 years 9 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
OSDI
2000
ACM
13 years 9 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
SIGSOFT
2010
ACM
13 years 6 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
MOBIHOC
2012
ACM
11 years 11 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su