Sciweavers

1240 search results - page 28 / 248
» Trusted Design in FPGAs
Sort
View
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 21 days ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
FPGA
2010
ACM
250views FPGA» more  FPGA 2010»
14 years 4 months ago
Variation-aware placement for FPGAs with multi-cycle statistical timing analysis
Deep submicron processes have allowed FPGAs to grow in complexity and speed. However, such technology scaling has caused FPGAs to become more susceptible to the effects of process...
Gregory Lucas, Chen Dong, Deming Chen
ERSA
2004
129views Hardware» more  ERSA 2004»
13 years 8 months ago
A Methodology for Energy Efficient Application Synthesis Using Platform FPGAs
Platform FPGAs incorporate many different components, such as processor core(s), reconfigurable logic, memory, etc., onto a single chip. When an application is synthesized on platf...
Jingzhao Ou, Viktor K. Prasanna
IAT
2007
IEEE
14 years 1 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
IJCSA
2010
110views more  IJCSA 2010»
13 years 5 months ago
Mechanized Cultural Reasoning as a Tool to Assess Trust in Virtual Enterprises
Abstract: The globalized knowledge society generates virtual enterprises that are usually set up and managed on the web, and the new trend is to make the relevant technologies avai...
Jacques Calmet, Pierre Maret, Marvin Schneider