Sciweavers

11 search results - page 2 / 3
» Constructing Secure Localization Systems with Adjustable Gra...
Sort
View
ICDCS
2008
IEEE
13 years 11 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
PLDI
2009
ACM
13 years 11 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
HASE
2007
IEEE
13 years 11 months ago
Scalable, Adaptive, Time-Bounded Node Failure Detection
This paper presents a scalable, adaptive and timebounded general approach to assure reliable, real-time Node-Failure Detection (NFD) for large-scale, high load networks comprised ...
Matthew Gillen, Kurt Rohloff, Prakash Manghwani, R...
RTAS
2009
IEEE
13 years 11 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
ISPD
2005
ACM
116views Hardware» more  ISPD 2005»
13 years 10 months ago
A fast algorithm for power grid design
This paper presents an efficient heuristic algorithm to design a power distribution network of a chip by employing a successive partitioning and grid refinement scheme. In an it...
Jaskirat Singh, Sachin S. Sapatnekar