Sciweavers

22 search results - page 5 / 5
» A Run-Time Memory Protection Methodology
Sort
View
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
13 years 11 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
IMC
2006
ACM
13 years 11 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...