Sciweavers

1240 search results - page 236 / 248
» Trusted Design in FPGAs
Sort
View
POPL
2008
ACM
14 years 8 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
OSDI
2002
ACM
14 years 8 months ago
Using Model Checking to Debug Device Firmware
Device firmware is a piece of concurrent software that achieves high performance at the cost of software complexity. They contain subtle race conditions that make them difficult t...
Sanjeev Kumar, Kai Li
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
14 years 8 months ago
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason
We are experiencing a new Social Web, where people share, communicate, commiserate, and conflict with each other. As evidenced by systems like Wikipedia, twitter, and delicious.co...
Ed H. Chi
SIGMOD
2009
ACM
132views Database» more  SIGMOD 2009»
14 years 8 months ago
Taming the storage dragon: the adventures of hoTMaN
HoTMaN (HoT-standby MaNager) is a joint research and development project between MySpace and USC Database Laboratory to design and develop a tool to ensure a 24x7 up-time and ease...
Shahram Ghandeharizadeh, Andrew Goodney, Chetan Sh...
EUROSYS
2008
ACM
14 years 5 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...